CN113535568B - Verification method, device, equipment and medium for application deployment version - Google Patents

Verification method, device, equipment and medium for application deployment version Download PDF

Info

Publication number
CN113535568B
CN113535568B CN202110829823.5A CN202110829823A CN113535568B CN 113535568 B CN113535568 B CN 113535568B CN 202110829823 A CN202110829823 A CN 202110829823A CN 113535568 B CN113535568 B CN 113535568B
Authority
CN
China
Prior art keywords
verification
program
application
target application
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110829823.5A
Other languages
Chinese (zh)
Other versions
CN113535568A (en
Inventor
董海龙
李涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC, ICBC Technology Co Ltd filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110829823.5A priority Critical patent/CN113535568B/en
Publication of CN113535568A publication Critical patent/CN113535568A/en
Application granted granted Critical
Publication of CN113535568B publication Critical patent/CN113535568B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The disclosure provides an application deployment version verification method, relates to the technical field of computers, and can be applied to the technical field of finance. The verification method of the application deployment version comprises the following steps: deploying the application deployment version to form a target application; running a verification program, wherein the verification program comprises a first interface, a second interface and a third interface; receiving an input verification rule through a first interface; calling a main function program through a second interface to acquire data of a target application; according to the verification rule, verifying the data of the target application by the main function program to obtain a verification result; and outputting the verification result through the third interface. The disclosure also provides a verification device, equipment and medium of the application deployment version. The verification method of the application deployment version can improve verification efficiency.

Description

Verification method, device, equipment and medium for application deployment version
Technical Field
The disclosure relates to the technical field of computers, in particular to a verification method, a device, equipment and a medium for application deployment version, which can be applied to the technical field of finance.
Background
With the development of information digitizing technology, the volume of business users is increased, the coverage function of the existing application system can not meet the user demands, so a large amount of product demands are put forward, aiming at research, development, test and version release, the development is carried out for a large amount of applications with more frequent periods, no effective tools or methods for verifying the deployed related application versions are available at present, and only manual verification can be performed, so that the verification efficiency is low.
Disclosure of Invention
In view of the foregoing, the present disclosure provides an application deployment version verification method, apparatus, device, and medium that improve verification efficiency.
According to a first aspect of the present disclosure, there is provided a method for verifying an application deployment version, including: deploying the application deployment version to form a target application; running a verification program, wherein the verification program comprises a first interface, a second interface and a third interface; receiving an input verification rule through a first interface; calling a main function program through a second interface to acquire data of a target application; according to the verification rule, verifying the data of the target application by the main function program to obtain a verification result; and outputting the verification result through the third interface.
According to an embodiment of the present disclosure, the verification method of the application deployment version further includes: deploying a web container on an application server of the target application; the authentication program is deployed on the web container.
According to an embodiment of the present disclosure, invoking the main function program through the second interface to obtain data of the target application includes: accessing a website of the target application; reading a webpage source code of a target application; cleaning the webpage source codes according to the verification rule; analyzing the webpage source code of the target application; and acquiring the relevant webpage data of the analyzed target application, wherein the relevant webpage data corresponds to the verification rule.
According to an embodiment of the present disclosure, according to a verification rule, verifying data of a target application by a main function program to obtain a verification result, specifically includes: searching a corresponding verification module in a verification library according to a verification rule, wherein the verification module is associated with data of a target application; and judging whether the target application accords with the verification rule according to the returned state code of the verification module.
According to an embodiment of the present disclosure, at least one of running the authentication program, inputting the authentication rule, and outputting the authentication result is performed through the web console.
According to an embodiment of the present disclosure, the application deployment version includes a new version and/or a defect repair version.
According to an embodiment of the present disclosure, the authentication program is a web program, and the main function program is a Python program.
A second aspect of the present disclosure provides an application deployment version verification apparatus, including:
the application version deployment module is used for deploying the application version to form a target application;
the verification program running module is used for running a verification program, wherein the verification program comprises a first interface, a second interface and a third interface;
the verification rule receiving module is used for receiving the input verification rule through the first interface;
a main function program calling module for calling a main function program through the second interface to acquire the data of the target application;
the verification module is used for verifying the data of the target application by the main functional program according to the verification rule so as to obtain a verification result; and
and the verification result output module is used for outputting the verification result through the third interface.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of verifying the application deployment version described above.
A fourth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-described method of validating an application deployment version.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be more apparent from the following description of embodiments of the disclosure with reference to the accompanying drawings, in which:
FIG. 1 schematically illustrates an application scenario diagram of an application deployment version verification method, apparatus, device and medium according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow diagram of a method of verification of an application deployment version in accordance with an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow diagram of another method of verification of an application deployment version in accordance with an embodiment of the present disclosure;
fig. 4 schematically shows a flowchart of the operation S204 of calling the main function program through the second interface to acquire data of the target application;
fig. 5 schematically shows a flowchart of verifying data of a target application by a main function program according to a verification rule in operation S205 to obtain a verification result;
FIG. 6 schematically illustrates a block diagram of a verification apparatus of an application deployment version according to an embodiment of the present disclosure; and
fig. 7 schematically illustrates a block diagram of an electronic device adapted to implement a verification method of application deployment versions according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where expressions like at least one of "A, B and C, etc. are used, the expressions should generally be interpreted in accordance with the meaning as commonly understood by those skilled in the art (e.g.," a system having at least one of A, B and C "shall include, but not be limited to, a system having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
With the development of information digitizing technology, the volume of business users increases, and the existing application system coverage function cannot meet the user demand, so a great deal of product demands are proposed, and in the process of realizing the application corresponding function, the processes of research and development, version release, version deployment, verification and the like are required. Specifically, a developer writes a code according to requirements to form a new application version, and in order to enable the application in the form of the code to run in a certain environment, deployment is required, and whether the deployed application meets the requirements is verified.
At present, in the face of a large number of application deployment versions with more frequent periods, no effective method and tool are available for automatically verifying the relevant application versions after deployment, time accumulation verification can only be carried out in an artificial naked eye mode, and the validity of application release cannot be effectively detected aiming at unstable factors existing in an application function verification stage. For example, after a certain web application is newly added with a large number of functional modules and is online, the display effect of each module can be checked only by manually clicking each module, whether each functional module operates normally is determined, finally, a disposal scheme is selected according to a verification result, modes such as rollback, field repair and later update can be selected, and the manual verification mode has long verification time and low accuracy.
It should be noted that, the method, the device, the equipment and the medium for verifying the application deployment version relate to the technical field of computers, artificial intelligence, big data and the technical field of internet of things, the method and the device for verifying the application deployment version can be used in the financial field and can also be used in any field except the financial field, and the method and the device for verifying the application deployment version are not limited to the application field.
In addition, in the technical scheme of the disclosure, the acquisition, storage, application and the like of the related personal information of the user are in accordance with the regulations of related laws and regulations, necessary security measures are taken, and the public order is not violated.
The embodiment of the disclosure provides a verification method of an application deployment version, comprising the following steps: deploying the application deployment version to form a target application; running a verification program, wherein the verification program comprises a first interface, a second interface and a third interface; receiving an input verification rule through a first interface; calling a main function program through a second interface to acquire data of a target application; according to the verification rule, verifying the data of the target application by the main function program to obtain a verification result; and outputting the verification result through the third interface.
The verification method of the application deployment version of the embodiment of the disclosure can at least achieve one of the following technical effects:
1) The application deployment version can be automatically verified, the workload of related verification personnel is reduced, the verification time is shortened, and the verification efficiency is improved.
2) According to different input verification rules, verification of application deployment versions with different requirements can be adapted, accuracy and verification efficiency of verification of application deployment versions are improved, and work of related verification personnel is simplified.
3) By running the verification program facing the related verification personnel and calling the main function program facing the target application, on one hand, the related verification personnel participate in the verification process, namely input verification rules and check verification results, and on the other hand, the main function program can automatically acquire data of the target application and data of the target application to obtain the verification results, so that the verification method has higher verification efficiency.
Fig. 1 schematically illustrates an application scenario diagram of verification of an application deployment version according to an embodiment of the present disclosure.
As shown in fig. 1, an application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that, the verification method of the application deployment version provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the verification device of the application deployment version provided by the embodiments of the present disclosure may be generally disposed in the server 105. The verification method of the application deployment version provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the verification apparatus of the application deployment version provided by the embodiments of the present disclosure may also be provided in a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The verification method of the application deployment version of the disclosed embodiment will be described in detail below with reference to fig. 2 to 5 based on the scenario described in fig. 1.
Fig. 2 schematically illustrates a flow chart of a verification method 200 of an application deployment version according to an embodiment of the disclosure.
As shown in fig. 2, the verification method 200 of the application deployment version of this embodiment includes operations S201 to S206.
In operation S201, an application deployment version is deployed to form a target application;
in operation S202, a verification program is run;
in operation S203, receiving an input authentication rule through a first interface;
in operation S204, the main function program is called through the second interface to acquire data of the target application;
in operation S205, the data of the target application is verified by the main function program according to the verification rule to obtain a verification result; and
in operation S206, the verification result is output through the third interface.
In the technical solution of the embodiment of the present disclosure, in operation S201, the application deployment version is deployed to form a target application, where "target application" refers to an application that is exposed in a form that can be run in a certain environment. The verification method 200 according to the embodiment of the present disclosure may directly perform the subsequent operations S202 to S206 without performing the operation S201 if it is directed to a certain application (i.e., has been formed as the target application) for which the deployment is completed.
In the technical solution of the embodiment of the present disclosure, in operation S202, the "verification program" refers to a program capable of verifying a target application, where the verification program includes a first interface, a second interface, and a third interface, and the "verification program" faces to related verification personnel, and is started to run by the related verification personnel. In operation S203, the input verification rule is received through the first interface, and it should be understood that the verification rule of the target application is not the same for different requirements, and the verification rule may be input by the related verifier. In operation S204, the main function program is called through the second interface to acquire data of the target application, and the "main function program" referred to herein is directed to the target application, and a function of acquiring data of the target application can be implemented. In operation S205, the data of the target application is verified by the main function program according to the verification rule to obtain a verification result, i.e., the main function program can also implement a verification function that uses the verification rule as a reference and verifies the target application.
The verification method 200 of the application deployment version of the embodiment of the disclosure can at least achieve one of the following technical effects:
1) The application deployment version can be automatically verified, the workload of related verification personnel is reduced, the verification time is shortened, and the verification efficiency is improved.
2) According to different input verification rules, verification of application deployment versions with different requirements can be adapted, accuracy and verification efficiency of verification of application deployment versions are improved, and work of related verification personnel is simplified.
3) By running the verification program facing the related verification personnel and calling the main function program facing the target application, on one hand, the related verification personnel participate in the verification process, namely input verification rules and check verification results, and on the other hand, the main function program can automatically acquire data of the target application and data of the target application to obtain the verification results, so that the verification method has higher verification efficiency.
As shown in fig. 3, the verification method 300 of an application deployment version according to another embodiment of the present disclosure further includes operations S301 to S302.
Deploying a web container on an application server of the target application in operation S301;
in operation S302, a verification program is deployed on a web container.
The "web container" referred to herein is a service program in which a port of a server (specifically, an application server) has a program for providing a corresponding service, and the program processes a request from a client (here, the client refers to the end facing the relevant business person).
Illustratively, the web container may be a Tomcat container in Java.
Since the web container has: communication support (for example, a series of complex operations such as a monitoring port are packaged), life cycle management, multithreading support and the like.
The operations S301 to S302 may be performed after the operation S201 and before the operation S202.
Referring to fig. 2 and 4, according to the verification method 200 of the application deployment version of the embodiment of the present disclosure, the invoking of the main function program through the second interface to obtain the data of the target application in operation S204 may include operations S41 to S45.
In operation S41, accessing a web address of a target application;
in operation S42, reading a web page source code of a target application;
in operation S43, cleaning the web page source code according to the verification rule;
in operation S44, analyzing the webpage source code of the target application;
in operation S45, relevant web page data of the parsed target application is obtained, where the relevant web page data corresponds to the verification rule.
In the technical solution of the embodiment of the present disclosure, in operation S41, the "address of accessing the target application" may specifically be an URL (uniform resource locator system) address of accessing the target application.
It should be noted that, the web container described above is generated based on a servlet, which is called servlet or service connector, is a server-side program written in Java, and has the characteristics of an independent platform and a protocol, and the main function is to interactively browse and generate data to generate dynamic web content. The web container processing flow is as follows in combination with the URL address: the associated verifier clicks on a URL address, whose URL points to a servlet, and the web container recognizes that what is required for this request is a servlet, so two objects are created: the method comprises the steps that httpservlet requests and httpservlet responses are found by a web container according to URLs in requests, a thread is created or distributed for the requests, two objects, namely the requests and the responses, are transmitted to the servlet threads, the web container calls a service () method of the servlet, the service () method can call a doGet () method or a dopest () method according to different types of the requests, wherein the doGet () method generates a dynamic page, the page is filled into the response object, finally, the threads are ended, the web container converts the response object into an http corresponding, and related verifiers are returned to destroy the response object and the request object.
It should be understood that, operations S41 to S45 are all implemented by a main function program, for example, a program written in Java or Python may read the web page source code according to the web address of the target application, clean the web page source code according to the verification rule, parse the web page source code of the target application, and obtain the relevant web page data of the parsed target application.
With the hundred-degree as the target application, the hundred-degree verification button is used for example, and the main function program can access the website of hundred degreeswww.baidu.comThe main function program can also read the source code of the hundred-degree webpage in a hundred-degree webpage checking element mode, when the button ' hundred-degree ' is verified, the verification rule can be a corresponding verification label, the main function program can also clean and analyze the source code to finally obtain relevant webpage data corresponding to the verification rule, and the ' can be read from the html label of the hundred-degree webpage in particular "<input type= "subset" … … value= "hundred degrees under" … …>"as relevant web page data corresponding to the authentication rule.
In the technical solution of the embodiment of the present disclosure, the source code of the web page of the target application that can be read by accessing the web address of the target application is limited to the source code of the general web site, and the source code of the web page that needs verification, needs the certificate, and the program is packaged cannot be obtained.
In the technical scheme of the embodiment of the disclosure, the main functional program can acquire, clean and analyze the webpage source codes in a mode of accessing the website of the target application, so that the related webpage data corresponding to the verification rule is obtained, and the data acquisition mode is simple and convenient.
Referring to fig. 2 and 5, according to the verification method 200 of the application deployment version of the embodiment of the present disclosure, the data of the target application is verified by the main function program according to the verification rule in operation S205 to obtain a verification result, which may specifically include operations S51 to S52:
in operation S51, according to the verification rule, searching a corresponding verification module in the verification library, wherein the verification module is associated with the data of the target application; and
in operation S52, it is determined whether the target application meets the verification rule according to the return status code of the verification module.
Taking a certain application deployment version as an example to add a certain function module, a related verifier can input the label of the function module as a verification rule, search the verification module with a corresponding function through a main function program, judge whether the label of the newly added function module exists or not and can be called, judge whether the newly added function module accords with the verification rule according to the return state code of the verification module, and determine the newly added function module as normal under the condition of accord with the verification rule.
In the technical scheme of the embodiment of the disclosure, through operations S51 to S52, the target application can be simply and conveniently verified according to the verification rule, and the verification library mode allows related verification personnel to add other verification modules to enrich the verification library.
For example, the verification library may be an existing library in Python, which has a corresponding module for a certain type of application version and a verification rule, for example, for an application version of a new module, the verification rule may be a tag for verifying the new module, and the library has a verification module for verifying the tag. The related verification staff enriches the verification library according to different types of verification versions, for example, only verification modules aiming at newly added modules exist in the initial verification library, and when the application version needing to be verified is encountered, the related verification staff can add the verification module for verifying the application version of the defect into the verification library.
According to the verification method 200 of the application deployment version of the embodiment of the present disclosure, at least one of running the verification program, inputting the verification rule, and outputting the verification result is performed through the web console.
The web console is a built-in modulator, and a verifier can use the web console for relevant monitoring and debugging operations.
In the technical scheme of the embodiment of the disclosure, the verifier can participate in the verification process through the independent web console, so that the verifier can operate intuitively and visually, and the work of the verifier is simplified.
Illustratively, running the validation program, inputting the validation rules, and outputting the validation results are all performed by the web console.
According to the verification method 200 of the application deployment version of the embodiment of the present disclosure, the application deployment version includes a new version and/or a defect repair version.
The "new version" refers to an application having a new function or a new module, etc., relative to the previous version, and the "defect repair version" refers to an application of the previous version having some defects, on the basis of the previous version, the application of the current version needs to repair the defects.
It should be noted that, for the "new version", the verification library has a verification module for verifying the new module or the new function; for the defect repair version, a verification module for verifying defect repair is arranged in a verification library.
According to the verification method of the application deployment version of the embodiment of the disclosure, the verification program is a web program, and the main function program is a Python program.
The web program has the advantages of simple deployment, convenient use, upgrade and maintenance; because the Python program has rich module libraries, the processing of various modules is supported, and the processing is more convenient, so that the main function program is written by using the Python more conveniently, and various required functions can be met.
Of course, the main function program is not limited to Python program, and the main function program written in other languages only needs to have the functions of accessing the website of the target application, reading the web page source code of the target application, cleaning according to the verification rule, analyzing the web page source code, verifying the data of the target application according to the verification rule, obtaining the verification result, and the like.
Based on the verification method of the application deployment version, the invention further provides a verification device of the application deployment version. The device will be described in detail below in connection with fig. 6.
Fig. 6 schematically illustrates a block diagram of a verification apparatus of an application deployment version according to an embodiment of the present disclosure.
As shown in fig. 6, the verification apparatus 400 of the application deployment version of this embodiment includes an application version deployment module 410, a verification program operation module 420, a verification rule receiving module 430, a main function program calling module 440, a verification module 450, and a verification result output module 460.
The application version deployment module 410 is configured to deploy application versions to form a target application, and in an embodiment, the application version deployment module 410 may be configured to perform the operation S201 described above, which is not described herein.
The verification program operation module 420 is configured to operate a verification program, where the verification program includes a first interface, a second interface, and a third interface, and in an embodiment, the verification program operation module 420 may be configured to perform the operation S202 described above, which is not described herein.
The verification rule receiving module 430 is configured to receive the input verification rule through the first interface, and in an embodiment, the verification rule receiving module 430 may be configured to perform the operation S203 described above, which is not described herein.
The main function program calling module 440 is configured to call a main function program through the second interface to obtain the data of the target application, and in an embodiment, the main function program calling module 440 may be configured to perform the operation S204 described above, which is not described herein.
The verification module 450 is configured to verify the data of the target application by the main function program according to the verification rule to obtain a verification result, and in an embodiment, the verification module 450 may be configured to perform the operation S205 described above, which is not described herein.
The verification result output module 460 is configured to output the verification result through the third interface, and in an embodiment, the verification result output module 460 may be used to perform the operation S206 described above, which is not described herein.
According to an embodiment of the present disclosure, any of the application version deployment module 410, the verification program execution module 420, the verification rule receiving module 430, the main function program calling module 440, the verification module 450, and the verification result output module 460 may be combined in one module to be implemented, or any of the modules may be split into a plurality of modules. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module. According to embodiments of the present disclosure, at least one of application version deployment module 410, validation program execution module 420, validation rule receiving module 430, main function program call module 440, validation module 450, and validation result output module 460 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), programmable Logic Array (PLA), system-on-chip, system-on-substrate, system-on-package, application Specific Integrated Circuit (ASIC), or as hardware or firmware in any other reasonable manner of integrating or packaging the circuitry, or as any one of or a suitable combination of three of software, hardware, and firmware. Alternatively, at least one of the application version deployment module 410, the authentication program execution module 420, the authentication rule receiving module 430, the main function program calling module 440, the authentication module 450, and the authentication result output module 460 may be at least partially implemented as a computer program module, which when executed, may perform the corresponding functions.
Fig. 7 schematically illustrates a block diagram of an electronic device adapted to implement a verification method of application deployment versions according to an embodiment of the present disclosure.
As shown in fig. 7, an electronic device 500 according to an embodiment of the present disclosure includes a processor 501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. The processor 501 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 501 may also include on-board memory for caching purposes. The processor 501 may comprise a single processing unit or a plurality of processing units for performing different actions of the method flows according to embodiments of the disclosure.
In the RAM 503, various programs and data required for the operation of the electronic apparatus 500 are stored. The processor 501, ROM 502, and RAM 503 are connected to each other by a bus 504. The processor 501 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 502 and/or the RAM 503. Note that the program may be stored in one or more memories other than the ROM 502 and the RAM 503. The processor 501 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, the electronic device 500 may also include an input/output (I/O) interface 505, the input/output (I/O) interface 505 also being connected to the bus 504. The electronic device 500 may also include one or more of the following components connected to the I/O interface 505: an input section 506 including a keyboard, a mouse, and the like; an output portion 507 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker, and the like; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The drive 510 is also connected to the I/O interface 505 as needed. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as needed so that a computer program read therefrom is mounted into the storage section 508 as needed.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 502 and/or RAM 503 and/or one or more memories other than ROM 502 and RAM 503 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. When the computer program product runs in a computer system, the program code is used for enabling the computer system to realize the verification method of the application deployment version provided by the embodiment of the disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 501. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed, and downloaded and installed in the form of a signal on a network medium, and/or installed from a removable medium 511 via the communication portion 509. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 509, and/or installed from the removable media 511. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 501. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be provided in a variety of combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (9)

1. A method for verifying a deployment version of an application, comprising:
deploying the application deployment version to form a target application;
running a verification program, wherein the verification program comprises a first interface, a second interface and a third interface;
receiving an input verification rule through the first interface;
calling a main function program through the second interface to acquire data of the target application;
according to the verification rule, verifying the data of the target application by the main functional program to obtain a verification result; and
outputting the verification result through the third interface,
invoking the host function program through the second interface to obtain the data of the target application includes:
accessing a website of the target application;
reading a webpage source code of a target application;
cleaning the webpage source codes according to the verification rule;
analyzing the webpage source code of the target application;
and acquiring the analyzed relevant webpage data of the target application, wherein the relevant webpage data corresponds to the verification rule.
2. The method for validating a deployment version of an application as defined in claim 1, further comprising:
deploying a web container on an application server of the target application;
the verification program is deployed on the web container.
3. The method for verifying a deployed version of an application according to claim 1, wherein verifying the data of the target application by the main function program according to the verification rule to obtain a verification result comprises:
searching a corresponding verification module in a verification library according to the verification rule, wherein the verification module is associated with the data of the target application; and
and judging whether the target application accords with the verification rule or not according to the return state code of the verification module.
4. The method of claim 1, wherein at least one of the steps of running a verification program, receiving input verification rules, and outputting the verification results is performed by a web console.
5. The method of any of claims 1-4, wherein the application deployment version comprises a new version and/or a defect repair version.
6. The method for verifying a deployment version of an application according to any one of claims 1 to 4, wherein the verification program is a web program and the main function program is a Python program.
7. An application version verification apparatus, comprising:
the application version deployment module is used for deploying the application version to form a target application;
the verification program running module is used for running a verification program, wherein the verification program comprises a first interface, a second interface and a third interface;
the verification rule receiving module is used for receiving the input verification rule through the first interface;
a main function program calling module for calling a main function program through the second interface to acquire the data of the target application;
the verification module is used for verifying the data of the target application by the main functional program according to the verification rule so as to obtain a verification result; and
a verification result output module for outputting the verification result through the third interface,
the main function program calling module includes:
the website access sub-module is used for accessing the website of the target application;
the webpage source code reading sub-module is used for reading the webpage source code of the target application;
the webpage source code cleaning sub-module is used for cleaning webpage source codes according to the verification rule;
the webpage source code analyzing sub-module is used for analyzing the webpage source codes of the target application;
and the webpage data acquisition sub-module is used for acquiring the relevant webpage data of the analyzed target application, wherein the relevant webpage data corresponds to the verification rule.
8. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-6.
9. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any of claims 1-6.
CN202110829823.5A 2021-07-22 2021-07-22 Verification method, device, equipment and medium for application deployment version Active CN113535568B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110829823.5A CN113535568B (en) 2021-07-22 2021-07-22 Verification method, device, equipment and medium for application deployment version

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110829823.5A CN113535568B (en) 2021-07-22 2021-07-22 Verification method, device, equipment and medium for application deployment version

Publications (2)

Publication Number Publication Date
CN113535568A CN113535568A (en) 2021-10-22
CN113535568B true CN113535568B (en) 2023-09-05

Family

ID=78120470

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110829823.5A Active CN113535568B (en) 2021-07-22 2021-07-22 Verification method, device, equipment and medium for application deployment version

Country Status (1)

Country Link
CN (1) CN113535568B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104050281A (en) * 2014-06-26 2014-09-17 北京思特奇信息技术股份有限公司 Webpage information extraction method and device based on http protocol
CN104765688A (en) * 2015-04-17 2015-07-08 上海交通大学 Verification system for Java program runtime capable of deploying rules dynamically
CN107239558A (en) * 2017-06-09 2017-10-10 成都布林特信息技术有限公司 Common interconnection network collecting method
CN109254921A (en) * 2018-09-18 2019-01-22 平安科技(深圳)有限公司 Application version verification method, device, computer equipment and storage medium
CN110188159A (en) * 2019-05-27 2019-08-30 深圳前海微众银行股份有限公司 Collage-credit data cut-in method, device, equipment and computer readable storage medium
WO2019232828A1 (en) * 2018-06-06 2019-12-12 平安科技(深圳)有限公司 Script deployment method and apparatus, and computer device and storage medium
CN111045756A (en) * 2019-12-10 2020-04-21 中国工商银行股份有限公司 Method, apparatus, computing device, and medium for generating interface service
CN111597114A (en) * 2020-05-18 2020-08-28 北京百度网讯科技有限公司 Method, device and equipment for verifying small program and storage medium
CN111651171A (en) * 2020-06-05 2020-09-11 中国银行股份有限公司 Interface version deployment method and device, electronic equipment and storage medium
CN111666210A (en) * 2020-05-20 2020-09-15 新华三半导体技术有限公司 Chip verification method and device
CN111917783A (en) * 2020-08-06 2020-11-10 吉林亿联银行股份有限公司 Method, device and storage medium for verifying general message

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7296297B2 (en) * 2001-07-30 2007-11-13 At&T Bls Intellectual Property Corporation System and method for using web-based applications to validate data with validation functions
US20050120024A1 (en) * 2003-09-26 2005-06-02 Tharpe James B.Jr. Systems, methods, and computer program products for tracking and controlling Internet use and recovering costs associated therewith
US8978029B2 (en) * 2013-05-13 2015-03-10 Sap Se Automated template deployment to computing platforms
US9830248B2 (en) * 2016-03-02 2017-11-28 Bank Of America Corporation System for automated code validation and deployment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104050281A (en) * 2014-06-26 2014-09-17 北京思特奇信息技术股份有限公司 Webpage information extraction method and device based on http protocol
CN104765688A (en) * 2015-04-17 2015-07-08 上海交通大学 Verification system for Java program runtime capable of deploying rules dynamically
CN107239558A (en) * 2017-06-09 2017-10-10 成都布林特信息技术有限公司 Common interconnection network collecting method
WO2019232828A1 (en) * 2018-06-06 2019-12-12 平安科技(深圳)有限公司 Script deployment method and apparatus, and computer device and storage medium
CN109254921A (en) * 2018-09-18 2019-01-22 平安科技(深圳)有限公司 Application version verification method, device, computer equipment and storage medium
CN110188159A (en) * 2019-05-27 2019-08-30 深圳前海微众银行股份有限公司 Collage-credit data cut-in method, device, equipment and computer readable storage medium
CN111045756A (en) * 2019-12-10 2020-04-21 中国工商银行股份有限公司 Method, apparatus, computing device, and medium for generating interface service
CN111597114A (en) * 2020-05-18 2020-08-28 北京百度网讯科技有限公司 Method, device and equipment for verifying small program and storage medium
CN111666210A (en) * 2020-05-20 2020-09-15 新华三半导体技术有限公司 Chip verification method and device
CN111651171A (en) * 2020-06-05 2020-09-11 中国银行股份有限公司 Interface version deployment method and device, electronic equipment and storage medium
CN111917783A (en) * 2020-08-06 2020-11-10 吉林亿联银行股份有限公司 Method, device and storage medium for verifying general message

Also Published As

Publication number Publication date
CN113535568A (en) 2021-10-22

Similar Documents

Publication Publication Date Title
US10216617B2 (en) Automatically complete a specific software task using hidden tags
US20180159724A1 (en) Automatic task tracking
CN110851471A (en) Distributed log data processing method, device and system
CN113362173A (en) Anti-duplication mechanism verification method, anti-duplication mechanism verification system, electronic equipment and storage medium
CN116483888A (en) Program evaluation method and device, electronic equipment and computer readable storage medium
CN113535568B (en) Verification method, device, equipment and medium for application deployment version
CN116257226A (en) Data verification method and device, electronic equipment and storage medium
CN110968497A (en) Tree-shaped interceptor-based request verification method, device, medium and electronic equipment
CN115190008B (en) Fault processing method, fault processing device, electronic equipment and storage medium
CN111290870A (en) Method and device for detecting abnormity
CN116450533B (en) Security detection method and device for application program, electronic equipment and medium
CN112948269B (en) Information processing method, information processing apparatus, electronic device, and readable storage medium
CN114938341B (en) Environment detection method and device, electronic equipment and storage medium
CN116401319B (en) Data synchronization method and device, electronic equipment and computer readable storage medium
CN114064484A (en) Interface testing method and device, electronic equipment and readable storage medium
CN114817921A (en) Code rectification method and device
CN114117449A (en) Hidden parameter mining-based test method and device, electronic equipment and medium
CN115629983A (en) Test case set generation method, device, equipment and medium
CN115098391A (en) Page detection method, device, equipment and medium
CN116743457A (en) Cluster permission changing method and device, electronic equipment and storage medium
CN114266547A (en) Method, device, equipment, medium and program product for identifying business processing strategy
CN113360417A (en) Test method, session modifier, electronic device, and medium
CN117708824A (en) Code auditing method, device, equipment and medium based on data stream tracking
CN114253789A (en) Method, device, equipment and storage medium for verifying graceful shutdown of container
CN116975200A (en) Method, device, equipment and medium for controlling working state of server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant