CN113868137A - Method, device and system for processing buried point data and server - Google Patents

Method, device and system for processing buried point data and server Download PDF

Info

Publication number
CN113868137A
CN113868137A CN202111142451.5A CN202111142451A CN113868137A CN 113868137 A CN113868137 A CN 113868137A CN 202111142451 A CN202111142451 A CN 202111142451A CN 113868137 A CN113868137 A CN 113868137A
Authority
CN
China
Prior art keywords
buried point
point data
field
data
element information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111142451.5A
Other languages
Chinese (zh)
Inventor
曹国良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Tuoxian Technology Co Ltd
Original Assignee
Beijing Jingdong Tuoxian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Tuoxian Technology Co Ltd filed Critical Beijing Jingdong Tuoxian Technology Co Ltd
Priority to CN202111142451.5A priority Critical patent/CN113868137A/en
Publication of CN113868137A publication Critical patent/CN113868137A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/3636Software debugging by tracing the execution of the program
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3692Test management for test results analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application provides a method, a device, a system and a server for processing buried point data, wherein the method comprises the following steps: the method comprises the steps of obtaining a first buried point table and buried point data of an application to be tested in a first terminal device, wherein the first buried point table comprises a first preset field and expected buried point data stored under the first preset field, extracting element information in the buried point data, writing the element information into a second preset field of a second buried point table in a database of a server, and determining whether the buried point data is correct or wrong according to the expected buried point data stored under the first preset field and the element information written into the second preset field of the second buried point table. In the technical scheme, expected buried point data stored in a field of a first buried point table is compared with element information stored in a field of a second buried point table, so that automatic detection of the buried point data can be realized, correctness or mistakes of the buried point data are determined, and the testing efficiency of the buried point data is improved.

Description

Method, device and system for processing buried point data and server
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method, an apparatus, a system, and a server for processing buried point data.
Background
In daily life, various operation behaviors of a user in an application program can be collected and counted through embedded points implanted in the application program to obtain embedded point data. The buried point data is used for guiding a developer to develop and optimize the application program. The buried point data is reported to the server, but when the application program is developed and is on-line, the buried point data acquired by the buried point implanted into the application program may have inaccurate and complete conditions, so that the buried point needs to be tested.
In the prior art, when testing a buried point, a tester mainly uses a packet capturing tool to capture data of the buried point reported to a server by an application program, and then checks and analyzes whether each buried point is normal one by one according to the reported data of the buried point.
However, in the embedded point test mode in the prior art, capturing and checking of embedded point data are all completed manually, the number of embedded points of an application program is usually large, and the efficiency of manually detecting the embedded point data collected by each embedded point is very low.
Disclosure of Invention
The application provides a method, a device, a system and a server for processing buried point data, which are used for solving the problem of low efficiency of the existing manual test of buried points.
In a first aspect, an embodiment of the present application provides a method for processing buried point data, including:
acquiring a first buried point table and buried point data of an application to be tested in first terminal equipment, wherein the first buried point table comprises a first preset field and expected buried point data stored in the first preset field;
extracting element information in the buried point data, and writing the element information into a second preset field of a second buried point table in a database of the server;
and determining whether the buried point data is correct or wrong according to the expected buried point data stored in the first preset field and the element information written in the second preset field of the second buried point table.
In a possible design of the first aspect, the determining that the buried point data is correct or incorrect according to the expected buried point data stored in the first preset field and the element information written in the second preset field of the second buried point table includes:
selecting a target field in the first preset field, and acquiring first expected buried point data stored in the target field;
determining a field to be tested from a second preset field of the second buried point table according to the target field;
acquiring first element information written into the field to be tested;
and determining whether the buried point data is correct or wrong according to the first expected buried point data stored in the target field and the first element information written in the field to be tested.
In another possible design of the first aspect, the determining that the buried point data is correct or incorrect according to the first expected buried point data stored in the target field and the first element information written in the field to be tested includes:
comparing the first expected buried point data stored in the target field with the first element information written in the field to be tested;
if the first expected buried point data is consistent with the first element information in comparison, determining that the buried point data is correct;
and if the first expected buried point data is inconsistent with the first element information in comparison, determining that the buried point data is wrong.
In yet another possible design of the first aspect, the writing the element information to a second preset field of a second table of landings in the database of the server includes:
acquiring a field to which the element information belongs;
determining a field to be written in the second buried point table according to the field to which the element information belongs;
and writing the element information into the field to be written of the second buried point table.
In another possible design of the first aspect, the obtaining of the buried point data of the application to be tested in the first terminal device includes:
acquiring an interface address of an application server of the application to be tested, wherein the interface address is used for data interaction between the application to be tested and the application server;
and acquiring buried point data of the application to be tested from the application server according to the interface address of the application server.
In yet another possible design of the first aspect, the obtaining the first table of burial points includes:
acquiring a target data table uploaded by second terminal equipment, wherein the expected buried point data is stored under a field of the target data table;
according to the field of the target data table, importing expected buried point data stored under the field of the target data table into a preset buried point table, wherein the preset buried point table comprises a first preset field;
and taking the preset buried point table as the first buried point table.
In yet another possible design of the first aspect, after the obtaining the target data form uploaded by the second terminal device connected to the server, the method further includes:
and extracting the preset buried point table from a preset database, wherein a first preset field of the preset buried point table is the same as that of the target data table.
In yet another possible design of the first aspect, the extracting the element information in the buried point data includes:
acquiring a buried point identifier according to a first preset field of the first buried point table and expected buried point data, wherein the buried point identifier is used for identifying a buried point to be detected in the application to be detected;
extracting the buried point data of the buried point to be detected from the buried point data according to the buried point identifier;
and acquiring the element information according to the buried point data of the buried point to be detected.
In yet another possible design of the first aspect, before the extracting the element information in the buried point data and writing the element information under a second preset field of a second buried point table in a database of the server, the method further includes:
and acquiring a second buried point table, and storing the second buried point table into the database.
In yet another possible design of the first aspect, after determining that the buried point data is correct or incorrect, the method further includes:
determining the buried point to be tested of the application to be tested according to the buried point data of the application to be tested;
and generating a buried point test report according to the buried point to be detected, the expected buried point data in the first preset field and the element information written in the second preset field of the second buried point table, wherein the buried point test report is used for indicating whether the buried point data of the buried point to be detected is correct or wrong.
In a second aspect, an embodiment of the present application provides an apparatus for processing buried point data, including:
the data acquisition module is used for acquiring a first embedded point table and embedded point data of an application to be detected in first terminal equipment, wherein the first embedded point table comprises a first preset field and expected embedded point data stored in the first preset field;
the information writing module is used for extracting element information in the buried point data and writing the element information into a second preset field of a second buried point table in a database of the server;
and the data determining module is used for determining whether the buried point data is correct or wrong according to the expected buried point data stored in the first preset field and the element information written in the second preset field of the second buried point table.
In a third aspect, an embodiment of the present application provides a system for processing buried point data, including a server, a first terminal device and a second terminal device, where the first terminal device and the second terminal device are both connected to the server;
the first terminal equipment is used for forwarding buried point data of the application to be tested to the server;
the second terminal device is used for uploading a target data table to the server;
the server is used for importing expected buried point data in the target data table into a first preset field of a first buried point table and importing the buried point data into a second buried point table;
and the server is also used for determining whether the buried point data is correct or wrong according to the first buried point table and the second buried point table.
In a fourth aspect, an embodiment of the present application provides a server, including a memory and at least one processor;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the method of any one of the above.
In a fifth aspect, the present application provides a readable storage medium, in which computer instructions are stored, and when executed by a processor, the computer instructions are used to implement the method according to any one of the above.
In a sixth aspect, the present application provides a program product comprising computer instructions that, when executed by a processor, implement the method as in any one of the above.
According to the method, the device, the system and the server for processing the buried point data, the expected buried point data stored in the field of the first buried point table is compared with the element information stored in the field of the second buried point table, so that the automatic detection of the buried point data can be realized, the correctness or the mistake of the buried point data can be determined, and the testing efficiency of the buried point data can be improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application;
fig. 1 is a scene schematic diagram of a processing method of buried point data according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a method for processing buried point data according to an embodiment of the present disclosure;
fig. 3 is a schematic flow interaction diagram of a processing method of buried point data according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a device for processing buried point data according to an embodiment of the present application;
FIG. 5 is a block diagram of a system for processing buried point data according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a server according to an embodiment of the present application.
With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms referred to in this application are explained first:
embedding points:
buried points, also known as Event tracing (Event Tracking), refer to the related art and its implementation that captures, processes, and transmits events for specific user behaviors.
Fig. 1 is a scene schematic diagram of a processing method of buried point data according to an embodiment of the present application, where an application scene according to the embodiment of the present application may be a server. As shown in fig. 1, a user may perform some specific operation on an application program of the mobile terminal 10 (e.g., a computer), such as clicking to log in. At this time, the embedded point in the application program can capture the embedded point data, such as the module, click bit, page number, event ID, page name, etc. These buried point data are reported to the server 11. Developers can achieve targeted development and optimization of applications by means of the buried point data.
In real life, the embedded points in each application program may have problems, so that the collected embedded point data may be in error or incomplete. Before an application program is on line, a tester needs to test the correctness and integrity of buried point data collected by buried points arranged in the application program to determine whether the buried points can work normally, and correct and complete buried point data is collected.
In the prior art, when testing a buried point, a tester mainly relies on some packet capturing tools, and when an application program reports the buried point data to a server, the tester captures the reported buried point data through the packet capturing tools. Or using logs to obtain buried point data. And then, the testers check the data of the buried points uploaded by the buried points one by one to determine whether the data is correct and complete. The efficiency of the testing mode is very slow, and in the testing process, because the testing personnel carry out manual detection, the error rate is high.
In view of the above problems, embodiments of the present application provide a method, an apparatus, a system, and a server for processing buried point data, where buried point data acquired by a buried point in an application to be tested is written into a second buried point table, and then compared with expected buried point data in a first buried point table, so that automatic detection of the buried point data can be realized, manual comparison by a tester is not required, test efficiency is improved, and an error rate caused by manual detection can be reduced.
The technical solution of the present application will be described in detail below with reference to specific examples. It should be noted that the following specific embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments.
Fig. 2 is a schematic flow chart of a processing method of buried point data provided in the embodiment of the present application, where the method may be applied to a server, and as shown in fig. 2, the method may specifically include the following steps:
s201, acquiring a first embedded point table and embedded point data of the application to be tested in the first terminal device.
The first buried point table comprises a first preset field and expected buried point data stored under the first preset field.
In this embodiment, the first terminal device may be a mobile terminal, such as a mobile phone or a computer, and if the first terminal device is a mobile phone, the mobile phone is installed with an application to be tested. A plurality of buried points can be set in the application to be tested, and the buried points can be specifically set according to the requirements of testing personnel. For example, a login buried point may be set in the application to be tested, and when a user performs a login operation, login data of the user may be acquired and obtained as the buried point data.
Optionally, the buried point data at least includes an operating system type, a module to which the buried point data belongs, a click/exposure position to which the buried point data belongs, a page number, an event id, a page name, an event parameter, a page id, a time type, occurrence time, identification information, a function description, identification information, an application version, and data reporting time.
The first embedded point table may be pre-stored in the database of the server, or may be uploaded to the database of the server by the tester before the tester starts testing.
For example, the first preset field of the first buried point table may include fields such as an operating system type, a module to which the first buried point table belongs, a click/exposure position to which the first buried point table belongs, a page number, an event id, a page name, an event parameter, a page id, a time type, occurrence time, identification information, a function description, identification information, an application version, and data reporting time.
Illustratively, the first table of burial points may be as shown in table 1 below:
Figure BDA0003284258500000071
TABLE 1
As shown in table 1 above, the expected buried point data is data written in the first predetermined field, for example, when the first predetermined field is "state", the expected buried point data written in the first predetermined field may be "new". When the first preset field is the 'affiliated module', the expected buried point data written under the first preset field can be 'big pharmacy'.
S202, extracting element information in the buried point data, and writing the element information into a second preset field of a second buried point table in a database of the server.
In this embodiment, the buried point data at least includes fields such as an operating system type, a module to which the operating system belongs, a click/exposure position to which the operating system belongs, a page number, an event id, a page name, an event parameter, a page id, a time type, occurrence time, identification information, a function description, identification information, an application version, data reporting time, and the like, and values or descriptions (i.e., element information) corresponding to the fields.
Illustratively, when the buried data includes an operating system type, the element information may be an android operating system, a windows operating system, or the like, which is determined according to an operating system of the first terminal device. Element information is correspondingly written into a second preset field of 'operating system type'. If the buried point data is the module to which the element information belongs, the element information may be text information describing the module to which the element information belongs, such as "enter a medicine box shopping cart" or "click settlement", and correspondingly, the element information may be written into a second preset field "the module to which the element information belongs". That is, the buried point data includes information indicating that certain element information is written in the corresponding second preset field.
The table frame of the second buried point table in the database is the same as that of the first buried point table, that is, the second preset field of the second buried point table may be the same as that of the first preset field of the first buried point table. But the element information in the buried point data of the application to be tested is written into the second preset field, and the expected buried point data is stored under the first preset field.
Optionally, in some embodiments, before writing the element information under the second preset field of the second table of burial points, the tester may determine the second preset field of the second table of burial points, and then upload the second preset field to the server and store the second preset field in the database.
S203, determining whether the buried point data is correct or wrong according to the expected buried point data stored in the first preset field and the element information written in the second preset field of the second buried point table.
For example, for some simpler embedded points in the application to be tested, such as the login embedded point, the element information in the embedded point data is written into the second preset field of the second embedded point table. Illustratively, for the login buried point, the second preset field is less, such as only including "click bit" and "page code". At this time, the element information in the two fields may be compared with the expected buried point data in the first preset field, and if the comparison is consistent, the buried point data is determined to be correct.
For example, in the comparison, the fields "click bit" and "page code" may be found in the first buried point table, that is, the first preset field is the same as the second preset field, and then the comparison is made whether the expected buried point data stored in the "click bit" and the "page code" is consistent with the element information written in the fields "click bit" and "page code" of the second buried point table. And if the comparison is consistent, determining that the buried point data is correct.
For example, for some complex buried points, the number of element information contained in the buried point data is large, and each element information is correspondingly written into a certain second preset field of the second buried point table. The number of the second preset fields is also larger, at this time, the second preset fields with the preset number can be selected from the second preset fields, the element information under the selected second preset fields is respectively compared with the expected buried point data under the first preset fields, and if the comparison is consistent, the buried point data is determined to be correct.
According to the embodiment of the application, element information of the buried point data to be tested is written into the second preset field of the second buried point table, and then expected buried point data in the first preset field of the first buried point table is utilized, whether the element information written into the second preset field of the second buried point table is correct or not can be automatically determined by the server, whether automatic detection of the buried point data is correct or not is achieved, on one hand, a tester can be prevented from frequently grabbing the buried point data by using a bale grabbing tool, on the other hand, the tester does not need to manually detect the buried point data, and the efficiency and accuracy of detection of the buried point data are improved.
Further, in some embodiments, the step S203 may be specifically implemented by the following steps:
selecting a target field in a first preset field, and acquiring first expected buried point data stored in the target field;
determining a field to be detected from a second preset field of a second buried point table according to the target field;
acquiring first element information written into a field to be detected;
and determining whether the buried point data is correct or wrong according to the first expected buried point data stored in the target field and the first element information written in the field to be detected.
In this embodiment, the first preset field may be a number of fields, for example, the fields include "status", "belonging module", "click bit", "page code", and "event identifier". The target field may refer to any one or more of these fields. For example, if the target field is "click," the first expected buried point data under that field may be "add a medicine box.
The second preset field in the second buried point table is the same as the first preset field in the first buried point table, and the field to be detected is the same as the target field. For example, when the target field is "click", the field to be tested is also "click".
The first element information stored in the field to be tested may be any one of "adding a medicine box" or "clicking to add a car" or "clicking to settle accounts".
Optionally, in an embodiment, the first expected buried point data stored in the target field may be compared with the first element information written in the field to be measured, if the first expected buried point data is consistent with the first element information in comparison, it may be determined that the buried point data is correct, and if the first expected buried point data is inconsistent with the first element information in comparison, it may be determined that the buried point data is incorrect.
For example, when the first element information is "add medicine box", the first expected burying point data in the above example may be the same, and in this case, the burying point data may be determined to be correct.
According to the embodiment of the application, the target field in the first preset field is selected, the field to be detected in the second preset field is determined according to the target field in the first preset field, automatic comparison of the first expected buried point data in the target field and the first element information in the field to be detected can be achieved, a tester does not need to manually detect the element information in the field to be detected, and the detection efficiency of the buried point data is improved.
In some embodiments, the step S202 of writing the element information into the second preset field of the second buried point table in the database of the server may specifically be implemented by the following steps:
acquiring a field to which the element information belongs;
determining a field to be written in the second buried point table according to the field to which the element information belongs;
and writing the element information into the field to be written of the second buried point table.
In this embodiment, the buried point data includes element information and a field to which the element information belongs, and for example, the element information may be "add medicine box", and the field to which the element information belongs may be "click bit".
Illustratively, the second table of burial points may be as shown in table 2 below:
Figure BDA0003284258500000101
TABLE 2
As shown in table 2 above, the second table includes fields such as "state", "module to which the second table belongs", "click bit", "page code", "event id", "page name", "pre-path", "event parameter", and "page parameter". For example, if the field to which the element information belongs is "click bit", the element information "add medicine box" is written into the column of "click bit".
According to the embodiment of the application, the element information is written into the field to which the element information belongs, the corresponding element information can be conveniently obtained by field searching, the element information of the field to which the element information belongs is compared with the first expected buried point data under the target field in the first preset field in the first buried point table, manual searching by testers is avoided, and the efficiency is improved.
In some embodiments, the step S201 of "obtaining buried point data of an application to be tested in the first terminal device" may be specifically implemented by the following steps:
acquiring an interface address of an application server of an application to be tested;
and acquiring buried point data of the application to be tested from the application server according to the interface address of the application server.
The interface address is used for data interaction between the application to be tested and the application server.
In this embodiment, in the process of using the application to be tested, the embedded point data acquired by the embedded point set in the application to be tested is uploaded to the application server through the interface address. Illustratively, the interface address uploaded by the application server's buried point data is www.aaa.com/aaa/.
When a tester tests, the server needs to obtain the buried point data uploaded by the application to be tested from the interface address.
Optionally, the tester may set a buried point data forwarding module in the first terminal device, and forward the buried point data uploaded to www.aaa.com/aaa to the server through the buried point data forwarding module.
According to the embodiment of the application, the embedded point data uploaded by the application to be tested is obtained from the application server, and the embedded point data of the application to be tested can be normally uploaded to the application server in the process of testing whether the embedded point data is correct, so that the normal work of the application to be tested is not influenced.
In some embodiments, the "acquiring the first buried point table" in the step S201 may specifically be implemented by the following steps:
acquiring a target data table uploaded by second terminal equipment;
according to the field of the target data table, importing expected buried point data stored under the field of the target data table into a preset buried point table;
and taking the preset buried point table as a first buried point table.
Expected buried point data are stored under fields of the target data table, and the preset buried point table comprises a first preset field.
In this embodiment, the second terminal device may be a computer, and the tester may log in a World Wide WEB (WEB) platform through the second terminal device to upload the target data table. Wherein the target data table has stored therein fields and expected burial data stored under each field.
Alternatively, in one embodiment, the predetermined list of burial points may be stored in a database of the server. The preset buried point table can be extracted from the database. The fields in the preset buried point table (i.e., the first preset fields) are the same as the fields in the target data table and correspond to one another. When the expected buried point data stored under the field in the target data table is imported into the preset buried point table, the field of the target data table and the field in the preset buried point table can be compared.
For example, taking a field in the target data table as a "click bit" as an example, a field of the "click bit" is found in a first preset field in the preset buried point table, and then the expected buried point data stored in the target data table under the "click bit" is imported into the preset buried point table under the "click bit".
According to the embodiment of the application, the fields in the preset buried point table are searched and obtained through the fields in the target data table, the expected buried point data can be automatically led into the preset buried point table, the first buried point table is obtained, manual leading-in of testers is not needed, and the leading-in efficiency of the data is improved.
In some embodiments, the "extracting element information from the buried point data" in step S202 may specifically be implemented by the following steps:
acquiring a buried point identifier according to a first preset field of a first buried point table and expected buried point data;
extracting buried point data of a buried point to be detected from the buried point data according to the buried point identifier;
and acquiring element information according to the buried point data of the buried point to be detected.
The buried point identification is used for identifying a buried point to be detected in an application to be detected. For example, the number of the buried points in the application to be tested may be multiple, and for example, the number of the buried points includes a login buried point, a registration buried point, and the like. The buried point identification can distinguish different buried points.
In this embodiment, the first buried point table may be added with a buried point identifier to determine whether the data collected by which buried point needs to be tested is correct. For example, the buried point to be tested may be a login buried point.
In the working process of the application to be detected, each embedded point acquires embedded point data, which embedded point data is the embedded point data acquired by the embedded point to be detected is determined through the embedded point identification, and then element information is extracted from the embedded point data acquired by the embedded point to be detected.
According to the embodiment of the application, the element information in the buried point data of the buried point to be tested is obtained through the buried point identification, the buried point to be tested can be flexibly selected to be tested in the test process, and the flexibility in the test process is improved.
In some embodiments, after determining that the buried point data is correct or incorrect, the processing method of the buried point data may further include the following steps:
determining a buried point to be tested of the application to be tested according to the buried point data of the application to be tested;
and generating a buried point test report according to the buried point to be tested, the expected buried point data in the first preset field and the element information written in the second preset field of the second buried point table.
The buried point test report is used for indicating whether the buried point data of the buried point to be tested is correct or wrong.
In this embodiment, the buried point data may include a buried point identifier of the buried point to be detected. Illustratively, the buried point identifier may be a digital code.
For example, the element information in the buried point data of the buried point to be detected may be written into the second preset field of the second buried point table. And outputting a buried point test report when the element information under the second preset field obtained by comparison is different from the expected buried point data under the first preset field in the first buried point table.
Illustratively, the buried point test report includes fields to which report results and/or element information that is different from expected buried point data belong. Wherein, the report result comprises the correctness or the mistake of the buried point data.
Illustratively, taking a first preset field in the first buried point table as a "click bit" as an example, the expected buried point data under the first preset field "click bit" is "add medicine box", a second preset field in the second buried point table corresponds to the "click bit", and if the element information under the second preset field "click bit" is "click add car", the output buried point test report includes a buried point data error and a "click bit".
Fig. 3 is a schematic flow interaction diagram of a processing method of buried point data according to an embodiment of the present application, and as shown in fig. 3, the mobile terminal may be a mobile phone, a computer, or the like. The server may be a test server. The method specifically comprises the following steps:
and S301, recording the operation behavior of the user using the application program to obtain buried point data.
S302, reporting the buried point data to an application server by the application program.
And S303, the application program forwards the buried point data reported to the application server to the test server.
S304, importing the buried point data table determined by the tester into a first buried point table in the database.
S305, receiving buried point data forwarded by the application program.
S306, writing the buried point data into the second buried point table.
S307, the expected buried point data in the first buried point table is compared with the buried point data in the second buried point table.
And S308, outputting a buried point test report.
In this embodiment, a tester can determine the corresponding expected buried point data according to the buried point to be tested, and write the expected buried point data into the buried point data table in advance. And then uploading the embedded point data table to a test server by logging in a WEB platform, and importing the embedded point data table into the first embedded point table by the test server.
The following are embodiments of the apparatus of the present application that may be used to perform embodiments of the method of the present application. For details which are not disclosed in the embodiments of the apparatus of the present application, reference is made to the embodiments of the method of the present application.
Fig. 4 is a schematic structural diagram of a device for processing embedded point data according to an embodiment of the present application, where the device for processing embedded point data may be integrated on a server, or may be independent of the server and cooperate with the server to complete the present application. As shown in fig. 4, the device 40 for processing buried point data includes a data obtaining module 41, an information writing module 42 and a data determining module 43.
The data obtaining module 41 is configured to obtain a first buried point table and buried point data of an application to be tested in a first terminal device. The information writing module 42 is configured to extract the element information in the buried point data, and write the element information into a second preset field of a second buried point table in the database of the server. The data determining module 43 is configured to determine whether the data of the buried point is correct or incorrect according to the expected data of the buried point stored in the first preset field and the element information written in the second preset field of the second buried point table.
The first buried point table comprises a first preset field and expected buried point data stored under the first preset field.
In some embodiments, the data determining module 43 may be specifically configured to:
selecting a target field in a first preset field, and acquiring first expected buried point data stored in the target field;
determining a field to be detected from a second preset field of a second buried point table according to the target field;
acquiring first element information written into a field to be detected;
and determining whether the buried point data is correct or wrong according to the first expected buried point data stored in the target field and the first element information written in the field to be detected.
Optionally, in some embodiments, the data determining module 43 may be specifically configured to:
comparing the first expected buried point data stored in the target field with the first element information written in the field to be tested;
if the first expected buried point data is consistent with the first element information in comparison, determining that the buried point data is correct;
and if the first expected buried point data is inconsistent with the first element information in comparison, determining that the buried point data is wrong.
In some embodiments, the information writing module 42 may be specifically configured to:
acquiring a field to which the element information belongs;
determining a field to be written in the second buried point table according to the field to which the element information belongs;
and writing the element information into the field to be written of the second buried point table.
In some embodiments, the data obtaining module 41 may specifically be configured to:
acquiring an interface address of an application server of an application to be tested;
and acquiring buried point data of the application to be tested from the application server according to the interface address of the application server.
The interface address is used for data interaction between the application to be tested and the application server.
Optionally, in some embodiments, the data obtaining module 41 may be specifically configured to:
acquiring a target data table uploaded by second terminal equipment;
according to the field of the target data table, importing expected buried point data stored under the field of the target data table into a preset buried point table;
and taking the preset buried point table as a first buried point table.
Expected buried point data are stored under fields of the target data table, and the preset buried point table comprises a first preset field.
In some embodiments, the information writing module 42 may be specifically configured to:
acquiring a buried point identifier according to a first preset field of a first buried point table and expected buried point data, wherein the buried point identifier is used for identifying a buried point to be detected in an application to be detected;
extracting buried point data of a buried point to be detected from the buried point data according to the buried point identifier;
and acquiring element information according to the buried point data of the buried point to be detected.
In some embodiments, the device 40 for processing the buried point data may further include an extraction module, configured to extract a preset buried point table from the database.
The first preset field of the preset buried point table is the same as the field of the target data table.
In some embodiments, the device 40 for processing the buried point data may further include a storage module, configured to obtain a second buried point table, and store the second buried point table in the database.
In some embodiments, the processing apparatus 40 for buried point data may further include a report generating module, configured to:
determining a buried point to be tested of the application to be tested according to the buried point data of the application to be tested;
and generating a buried point test report according to the buried point to be tested, the expected buried point data in the first preset field and the element information written in the second preset field of the second buried point table.
The buried point test report is used for indicating whether the buried point data of the buried point to be tested is correct or wrong.
The apparatus provided in the embodiment of the present application may be used to execute the method in the above embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
It should be noted that the division of the modules of the above apparatus is only a logical division, and the actual implementation may be wholly or partially integrated into one physical entity, or may be physically separated. And these modules can be realized in the form of software called by processing element; or may be implemented entirely in hardware; and part of the modules can be realized in the form of calling software by the processing element, and part of the modules can be realized in the form of hardware. For example, the data acquisition module may be stored in the memory of the apparatus in the form of program code, which is called by a processing element of the apparatus and performs the functions of the data acquisition module. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
Fig. 5 is a schematic block diagram of a system for processing buried point data according to an embodiment of the present application, and as shown in fig. 5, the system 50 for processing buried point data includes a server 51, a first terminal device 52, and a second terminal device 53.
The first terminal device 52 is configured to forward the buried point data of the application to be tested to the server 51;
the second terminal device 53 is configured to upload the target data table to the server 51;
the server 51 is configured to import expected buried point data in the target data table into a first preset field of the first buried point table, and import buried point data into the second buried point table;
the server 51 is further configured to determine whether the buried point data is correct or incorrect according to the first buried point table and the second buried point table.
In this embodiment, the first terminal device 52 may be a mobile phone or a computer installed with an application to be tested. The second terminal device 53 may upload the target data table to the server 51 through the WEB platform.
Fig. 6 is a schematic structural diagram of a server according to an embodiment of the present application. As shown in fig. 6, the server 60: at least one processor 61, memory 62, bus 63.
Wherein: the processor 61 and the memory 62 communicate with each other via a bus 63. A second table of burial points may be stored in the memory 62.
The processor 61 is configured to execute the computer-executable instructions stored in the memory 62, and may specifically execute the relevant steps in the method described in the above embodiments.
The processor 61 may be a central processor. The server includes one or more processors, which may be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 62 for storing computer-executable instructions. The memory 62 may comprise high speed RAM memory and may also include non-volatile memory, such as at least one disk memory.
The present embodiment also provides a readable storage medium, in which computer instructions are stored, and when at least one processor of the server executes the computer instructions, the server executes the processing method of the buried point data provided in the above various embodiments.
The present embodiments also provide a program product comprising computer instructions stored in a readable storage medium. The computer instructions can be read from a readable storage medium by at least one processor of the server, and the computer instructions executed by the at least one processor cause the server to implement the processing method of the buried point data provided by the various embodiments described above.
In the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship; in the formula, the character "/" indicates that the preceding and following related objects are in a relationship of "division". "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.
It is to be understood that the various numerical references referred to in the embodiments of the present application are merely for convenience of description and distinction and are not intended to limit the scope of the embodiments of the present application. In the embodiment of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiment of the present application.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (15)

1. A method for processing buried point data is applied to a server and comprises the following steps:
acquiring a first buried point table and buried point data of an application to be tested in first terminal equipment, wherein the first buried point table comprises a first preset field and expected buried point data stored in the first preset field;
extracting element information in the buried point data, and writing the element information into a second preset field of a second buried point table in a database of the server;
and determining whether the buried point data is correct or wrong according to the expected buried point data stored in the first preset field and the element information written in the second preset field of the second buried point table.
2. The method of claim 1, wherein said determining whether said buried point data is correct or incorrect based on expected buried point data stored in said first predetermined field and element information written in a second predetermined field of said second buried point table comprises:
selecting a target field in the first preset field, and acquiring first expected buried point data stored in the target field;
determining a field to be tested from a second preset field of the second buried point table according to the target field;
acquiring first element information written into the field to be tested;
and determining whether the buried point data is correct or wrong according to the first expected buried point data stored in the target field and the first element information written in the field to be tested.
3. The method as claimed in claim 2, wherein the determining whether the buried point data is correct or wrong according to the first expected buried point data stored in the target field and the first element information written in the field to be tested comprises:
comparing the first expected buried point data stored in the target field with the first element information written in the field to be tested;
if the first expected buried point data is consistent with the first element information in comparison, determining that the buried point data is correct;
and if the first expected buried point data is inconsistent with the first element information in comparison, determining that the buried point data is wrong.
4. The method of claim 1, wherein the writing the element information to the database of the server under a second preset field of a second table of landings comprises:
acquiring a field to which the element information belongs;
determining a field to be written in the second buried point table according to the field to which the element information belongs;
and writing the element information into the field to be written of the second buried point table.
5. The method of claim 1, wherein the obtaining of the buried point data of the application to be tested in the first terminal device comprises:
acquiring an interface address of an application server of the application to be tested, wherein the interface address is used for data interaction between the application to be tested and the application server;
and acquiring buried point data of the application to be tested from the application server according to the interface address of the application server.
6. The method of claim 1, wherein said obtaining a first table of burial points comprises:
acquiring a target data table uploaded by second terminal equipment, wherein the expected buried point data is stored under a field of the target data table;
according to the field of the target data table, importing expected buried point data stored under the field of the target data table into a preset buried point table, wherein the preset buried point table comprises a first preset field;
and taking the preset buried point table as the first buried point table.
7. The method according to claim 6, wherein after acquiring the target data table uploaded by the second terminal device, the method further comprises:
and extracting the preset buried point table from the database, wherein a first preset field of the preset buried point table is the same as a field of the target data table.
8. The method of claim 1, wherein the extracting element information in the buried point data comprises:
acquiring a buried point identifier according to a first preset field of the first buried point table and expected buried point data, wherein the buried point identifier is used for identifying a buried point to be detected in the application to be detected;
extracting the buried point data of the buried point to be detected from the buried point data according to the buried point identifier;
and acquiring the element information according to the buried point data of the buried point to be detected.
9. The method according to any one of claims 1 to 8, wherein before extracting the element information in the buried point data and writing the element information under a second preset field of a second buried point table in the database of the server, the method further comprises:
and acquiring a second buried point table, and storing the second buried point table into the database.
10. The method of any one of claims 1-8, wherein after determining that the buried point data is correct or incorrect, further comprising:
determining the buried point to be tested of the application to be tested according to the buried point data of the application to be tested;
and generating a buried point test report according to the buried point to be detected, the expected buried point data in the first preset field and the element information written in the second preset field of the second buried point table, wherein the buried point test report is used for indicating whether the buried point data of the buried point to be detected is correct or wrong.
11. An apparatus for processing buried point data, comprising:
the data acquisition module is used for acquiring a first embedded point table and embedded point data of an application to be detected in first terminal equipment, wherein the first embedded point table comprises a first preset field and expected embedded point data stored in the first preset field;
the information writing module is used for extracting element information in the buried point data and writing the element information into a second preset field of a second buried point table in a database of the server;
and the data determining module is used for determining whether the buried point data is correct or wrong according to the expected buried point data stored in the first preset field and the element information written in the second preset field of the second buried point table.
12. A processing system of data of buried points is characterized by comprising a server, a first terminal device and a second terminal device, wherein the first terminal device and the second terminal device are both connected with the server;
the first terminal equipment is used for forwarding buried point data of the application to be tested to the server;
the second terminal device is used for uploading a target data table to the server;
the server is used for importing expected buried point data in the target data table into a first preset field of a first buried point table and importing the buried point data into a second buried point table;
and the server is also used for determining whether the buried point data is correct or wrong according to the first buried point table and the second buried point table.
13. A server, comprising a memory and at least one processor;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the method of any one of claims 1-10.
14. A readable storage medium having stored therein computer instructions, which when executed by a processor, are adapted to implement the method of any one of claims 1-10.
15. A program product comprising computer instructions, characterized in that the computer instructions, when executed by a processor, implement the method of any of claims 1-10.
CN202111142451.5A 2021-09-28 2021-09-28 Method, device and system for processing buried point data and server Pending CN113868137A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111142451.5A CN113868137A (en) 2021-09-28 2021-09-28 Method, device and system for processing buried point data and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111142451.5A CN113868137A (en) 2021-09-28 2021-09-28 Method, device and system for processing buried point data and server

Publications (1)

Publication Number Publication Date
CN113868137A true CN113868137A (en) 2021-12-31

Family

ID=78991877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111142451.5A Pending CN113868137A (en) 2021-09-28 2021-09-28 Method, device and system for processing buried point data and server

Country Status (1)

Country Link
CN (1) CN113868137A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116795656A (en) * 2023-06-05 2023-09-22 深圳市同行者科技有限公司 Early warning prompting method, device, equipment and storage medium for buried point error

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116795656A (en) * 2023-06-05 2023-09-22 深圳市同行者科技有限公司 Early warning prompting method, device, equipment and storage medium for buried point error
CN116795656B (en) * 2023-06-05 2024-05-14 深圳市同行者科技有限公司 Early warning prompting method, device, equipment and storage medium for buried point error

Similar Documents

Publication Publication Date Title
US9317400B2 (en) Code coverage rate determination method and system
CN102804147A (en) Code inspection executing system for performing a code inspection of ABAP source codes
CN111290956B (en) Brain graph-based test method and device, electronic equipment and storage medium
CN110287700B (en) iOS application security analysis method and device
CN113868137A (en) Method, device and system for processing buried point data and server
CN111767213B (en) Database check point testing method and device, electronic equipment and storage medium
CN116738091A (en) Page monitoring method and device, electronic equipment and storage medium
CN112084108A (en) Test script generation method and device and related components
CN115563008A (en) Code coverage rate detection system, method, device and storage medium
CN113037521B (en) Method for identifying state of communication equipment, communication system and storage medium
CN115309661A (en) Application testing method and device, electronic equipment and readable storage medium
CN115310011A (en) Page display method and system and readable storage medium
CN113590495A (en) Method, device, equipment and storage medium for determining test coverage rate
CN113326046A (en) Method and device for acquiring compiling time length
CN113760696A (en) Program problem positioning method and device, electronic equipment and storage medium
CN111338956A (en) Automatic pressure measurement method, device, equipment and storage medium
CN112612882B (en) Review report generation method, device, equipment and storage medium
CN116541305B (en) Abnormality detection method and device, electronic equipment and storage medium
CN112115046B (en) Software fault positioning method, device and terminal
CN115686962A (en) Server link detection method and device and electronic equipment
CN114816989A (en) Optimization method of automatic test script and related equipment
CN115328790A (en) Test code generation method, device, equipment and readable storage medium
CN115344494A (en) Element positioning method and device of test case, computer equipment and medium
CN115344565A (en) Flow data quality checking method and device, electronic equipment and storage medium
CN114115907A (en) Instruction detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination