CN109634832A - Application testing method and system - Google Patents

Application testing method and system Download PDF

Info

Publication number
CN109634832A
CN109634832A CN201710929387.2A CN201710929387A CN109634832A CN 109634832 A CN109634832 A CN 109634832A CN 201710929387 A CN201710929387 A CN 201710929387A CN 109634832 A CN109634832 A CN 109634832A
Authority
CN
China
Prior art keywords
application
request
call
result
entrance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710929387.2A
Other languages
Chinese (zh)
Other versions
CN109634832B (en
Inventor
秦承刚
胡瑞永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710929387.2A priority Critical patent/CN109634832B/en
Publication of CN109634832A publication Critical patent/CN109634832A/en
Application granted granted Critical
Publication of CN109634832B publication Critical patent/CN109634832B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3664Environments for testing or debugging software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This application provides application testing method and system, one of application testing method includes: the entry request received in real network environment;It is applied using first entrance and entry request described in application execution before changing, and obtains the first feedback result corresponding with the entry request;The entry request and first feedback result are sent, so that equipment executes the entry request and the second feedback result of acquisition after change, first feedback result and second feedback result is compared and obtains test result.The application using the request (i.e. true test case) in real network environment to after change using testing, so being not necessarily to manual maintenance test case;Also, the request in real network environment can cover various application scenarios, so test coverage is higher.

Description

Application testing method and system
Technical field
This application involves field of communication technology more particularly to application testing method and systems.
Background technique
Currently, server have it is many apply (i.e. the application program of server-side), using can be used to implement business function. It, can be (corresponding to the application execution change operation on server as the business such as business function, service traffics change on server With execution fractured operation or to multiple application execution union operations) so that server preferably provides service.
For example, by taking two business functions are realized in server one application as an example, it, should when the service traffics of the application increase Using be not enough to realize two business functions;The application can be split as to two applications, so as to by two business in the case of this Function is distributed to two applications after splitting.
Such as: by taking the order of server is using upper realization order processing function and preferential distribution function as an example, server is risen The service traffics of step section are smaller, so order application can be with execution of order processing function and preferential distribution function.With industry Order application can be split as the order application of only execution of order processing function and execute preferential distribution function by the increase of business flow The preferential distribution application of energy.
For example, being found in practical applications, this two so that two applications of server realize two business functions respectively as an example A business function can reach more dominance energy or more preferable user experience when being used in combination, can close two business functions in the case of this And into an application.
Such as: realize that order inquiries function is answered in order in logistics enquiring application with the logistics enquiring function of server With middle realization, find that response speed can be promoted when order inquiries function and logistics enquiring function merge in practical applications And user experience, it is possible to logistics enquiring be applied and an application is merged into order application.
It is understood that executing using change operation in server (to application execution fractured operation or to multiple applications Execute union operation) after, need to after change using testing, to verify the availability applied after change.
Existing testing scheme predominantly by automatic test script to after change using testing.But automatic test Script scheme needs artificial constantly maintenance test use-case, and the corresponding application scenarios of test case are limited, not can guarantee test Coverage rate.
Summary of the invention
In consideration of it, the application provides application testing method and system, it can be to the request utilized in real network environment (i.e. True test case) to after change using testing, so being not necessarily to manual maintenance test case;Also, live network ring Request in border can cover various application scenarios, so test coverage is higher.
This application provides following technical characteristics to achieve the goals above:
A kind of application test systems, comprising:
Equipment before changing, for receiving the entry request in real network environment, using first entrance apply and before changing Entry request described in application execution obtains corresponding with the entry request the first feedback result, send the entry request with First feedback result;
Equipment after change, for obtaining the entry request and first feedback result, using second entrance apply and Entry request described in application execution after change obtains the second feedback result corresponding with the entry request, comparison described first Feedback result and second feedback result obtain test result;
Wherein, described application is executes the one or more application before fractionation or union operation before changing, after the change Using for execute split or union operation after one or more application.
Optionally, the equipment before changing is also used to applying using first entrance and entering described in application execution before changing In the case where executing intrinsic call during mouth request, random number is distributed for intrinsic call request and sends intrinsic call request Random number, after executing intrinsic call send intrinsic call request random number;
Equipment after the change is also used to obtain several random numbers that the equipment before changing is used for intrinsic call, and will Several random numbers execute xor operation and obtain exclusive or as a result, if the exclusive or result is zero, utilize second into described Entry request step described in application execution after entrance application and change.
Optionally, the equipment before changing is also used to applying using first entrance and entering described in application execution before changing In the case where executing intrinsic call during mouth request, random number is distributed for intrinsic call request and sends intrinsic call request Random number exclusive or as a result, after executing intrinsic call send intrinsic call request random number exclusive or result;
Equipment after the change is also used to obtain the exclusive or of several random numbers for intrinsic call of equipment before changing As a result, and several exclusive or results are executed xor operation acquisition exclusive or again as a result, entering the benefit if the exclusive or result is zero Entry request step described in application execution after being applied and changed with second entrance.
Optionally, the equipment before changing is also used to applying using first entrance and entering described in application execution before changing In the case where executing external call during mouth request, records the external call sent to applications is requested first and request Enter that ginseng and applications send returns the result, and sends described first and request into ginseng and return the result;
Equipment after the change is also used to the entry request mistake described in application execution after applying and changing using second entrance In the case where executing external call in journey, obtains the external call sent to applications is requested second and request into ginseng, more A first, which request that participation is corresponding, returns the result, and finds and requests to return the result into ginseng is corresponding with described second, and to The external call request is fed back this and is returned the result.
Optionally, further includes:
With the background devices that are connected of equipment after the equipment before changing and change, described first is sent for building and respectively Entrance application carries out the application identities collection of intrinsic call, the application before changing carries out the application identities collection, described of intrinsic call Using the application identities collection for carrying out intrinsic call after the application identities collection of second entrance application progress intrinsic call and the change;
The first entrance application of the equipment before changing, is also used to receive and store that the background devices send described the The application of one entrance carries out the application identities collection of intrinsic call, and during executing the entry request, is based on described first Entrance application carries out the application identities collection of intrinsic call, determines that call request is that external call request or intrinsic call are requested;
The application before changing of the equipment before changing, for receiving and storing described in the background devices transmission before changing Using the application identities collection for carrying out intrinsic call, and during executing the entry request, applied before changing based on described The application identities collection for carrying out intrinsic call determines that call request is that external call request or intrinsic call are requested;
The second entrance application of equipment after the change, is also used to receive and store that the background devices send described the The application of two entrances carries out the application identities collection of intrinsic call, and during executing the entry request, is based on described second Entrance application carries out the application identities collection of intrinsic call, determines that call request is that external call request or intrinsic call are requested;
It is applied after the change of equipment after the change, after receiving and storing the change that the background devices are sent Using the application identities collection for carrying out intrinsic call, and during executing the entry request, based on being applied after the change The application identities collection for carrying out intrinsic call determines that call request is that external call request or intrinsic call are requested.
Optionally, further include with after the change first entrance described in equipment request and the change after apply be connected Store equipment;
Equipment is also used to receive and sends the multiple of the transmission of equipment before changing to the storage equipment after the change First requests into ginseng and corresponding returns the result;
The background devices request to tie into ginseng and corresponding return for storing multiple the first of the equipment before changing Fruit;
During then equipment is requested that participation is corresponding and returned the result multiple first after the change, find and described second Request to return the result into ginseng is corresponding, specifically include: found from the storage equipment requested with described second it is corresponding into ginseng Return the result.
A kind of application testing method, comprising:
It is applied and the entry request in application execution real network environment before changing in equipment utilization first entrance before changing And after obtaining the first feedback result, the entry request is obtained;
Entry request described in application execution after applying and change using second entrance, and obtain corresponding with the entry request The second feedback result;
It compares first feedback result and second feedback result and obtains test result;
Wherein, described application is executes the one or more application before fractionation or union operation before changing, after the change Using for execute split or union operation after one or more application.
Optionally, it after described using second entrance application and change before entry request described in application execution, also wraps It includes:
Obtain the exclusive or result of several random numbers for intrinsic call of equipment before changing;
Xor operation is executed to several exclusive or results again and obtains exclusive or result;
If the exclusive or result is zero, asked into described using entrance described in application execution after second entrance application and change The step of asking.
Optionally, it after described using second entrance application and change before entry request described in application execution, also wraps It includes:
Obtain several random numbers that the equipment before changing is used for intrinsic call;
Xor operation is executed to several random numbers and obtains exclusive or result;
If the exclusive or result is zero, asked into described using entrance described in application execution after second entrance application and change The step of asking.
It is optionally, described to utilize entry request described in application execution after second entrance application and change, comprising:
During the entry request described in application execution after the utilization second entrance is applied and changed, judge whether to send out Raw external call;
In the case where determining generation external call, the second request that the external call sent to applications is requested is obtained Enter ginseng;
In requesting that participation is corresponding multiple first and return the result, finds and request to return into ginseng is corresponding with described second It returns as a result, and this is returned the result to external call request feedback;
Wherein, the multiple first ginseng and corresponding return the result is requested to enter described in the execution for the equipment before changing It is generated in the case of generation external call during mouth request.
It optionally, further include receiving and storing the application identities collection for becoming and carrying out intrinsic call;
It is then described to judge whether that external call occurs, comprising:
Judge that the purpose application identities of call request whether there is in the application identities collection;
If it does not exist in the application identities collection, it is determined that external call occurs, the call request is external call Request.
A kind of application testing method, comprising:
Receive the entry request in real network environment;
It is applied and entry request described in application execution before changing, and obtained corresponding with the entry request using first entrance The first feedback result;
The entry request and first feedback result are sent, for the equipment execution entry request after change and is obtained The second feedback result is obtained, first feedback result and second feedback result are compared and obtains test result;
Wherein, described application is executes the one or more application before fractionation or union operation before changing, after the change Using for execute split or union operation after one or more application.
Optionally, further includes:
During the utilization first entrance is applied with entry request described in application execution before changing, judge whether to send out Raw intrinsic call;
If it is determined that intrinsic call occurs, then request to generate random number for intrinsic call and sends the random of intrinsic call request Several exclusive or results;
The exclusive or result of the random number of intrinsic call request is sent after executing intrinsic call.
Optionally, further includes:
During the utilization first entrance is applied with entry request described in application execution before changing, judge whether to send out Raw intrinsic call;
If it is determined that occur intrinsic call, then be intrinsic call request generate random number, and send intrinsic call request with Machine number;
The random number of intrinsic call request is sent after executing intrinsic call.
Optionally, the exclusive or of the random number that intrinsic call request is sent after executing intrinsic call is as a result, packet It includes:
The first entrance applies as intrinsic call request distribution random number and transmission is asked comprising the intrinsic call of random number It asks to described and applies before changing, after first entrance application obtains first feedback result, send intrinsic call request Random number exclusive or result;
Application receives requesting comprising random number intrinsic call for the first entrance application transmission before changing, in not occurring In the case that portion is called, after executing the interior call request, the exclusive or result of the random number of intrinsic call request is sent;
Application receives requesting comprising random number intrinsic call for the first entrance application transmission before changing, inside generation In the case where calling, for intrinsic call request distribution random number and transmission is requested comprising the intrinsic call of random number to another change Preceding application sends the exclusive or result of the random number of intrinsic call request in executing after call request.
It optionally, further include receiving and storing the application identities collection for becoming and carrying out intrinsic call;
It is then described to judge whether that intrinsic call occurs, comprising:
Judge that the purpose application identities of call request whether there is in the application identities collection;
If it exists in the application identities collection, it is determined that intrinsic call occurs, the call request is asked for intrinsic call It asks.
A kind of application testing method, comprising:
Receive the entry request in real network environment;
It is applied using first entrance and entry request described in application execution, acquisition is corresponding with the entry request before changing First feedback result;
Entry request described in application execution, obtains corresponding with the entry request after applying and change using second entrance Second feedback result;
It compares first feedback result and second feedback result obtains test result;
Wherein, described application is executes the one or more application before fractionation or union operation before changing, after the change Using for execute split or union operation after one or more application.
Optionally, further includes:
Intrinsic call is executed during applying using first entrance and entry request described in application execution before changing In the case of, random number is distributed for intrinsic call and records the exclusive or of the random number of intrinsic call as a result, executing intrinsic call knot The exclusive or result of the random number of intrinsic call is recorded after beam;
Several exclusive or results are executed into xor operation again and obtain exclusive or result;
If the exclusive or result is zero, asked into described using entrance described in application execution after second entrance application and change Seek step.
Optionally, further includes:
Intrinsic call is executed during applying using first entrance and entry request described in application execution before changing In the case of, random number is distributed for intrinsic call and records the random number of intrinsic call, after executing intrinsic call in record The random number that portion is called;
Several random numbers are executed into xor operation and obtain exclusive or result;
If the exclusive or result is zero, asked into described using entrance described in application execution after second entrance application and change Seek step.
Optionally, further includes:
External call is executed during applying using first entrance and entry request described in application execution before changing In the case of, it records the external call sent to applications is requested first and requests the return sent into ginseng and the applications As a result;
The feelings of external call are executed during the entry request described in application execution after applying and change using second entrance Under condition, obtains the external call sent to applications is requested second and request into ginseng;
In requesting that participation is corresponding multiple first and return the result, finds and request to return into ginseng is corresponding with described second Return result;
To external call request feedback, this is returned the result.By the above technological means, may be implemented following beneficial to effect Fruit:
It is input to before changing using the request (i.e. true test case) in real network environment using simultaneously in the application The first feedback result is obtained, then the request in real network environment is input to after change using testing, and obtains the Two feedback results.The first feedback result and second feedback result are compared to verify the availability applied after change.
The application using the request (i.e. true test case) in real network environment to after change using testing, So being not necessarily to manual maintenance test case;Also, the request in real network environment can cover various application scenarios, so surveying It is higher to try coverage rate.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 a-1b is a kind of structural schematic diagram of application test systems disclosed in the embodiment of the present application;
Fig. 2 is a kind of flow chart of application testing method disclosed in the embodiment of the present application;
Fig. 3 is the structural schematic diagram of another application test systems disclosed in the embodiment of the present application;
Fig. 4 is the flow chart of another application testing method disclosed in the embodiment of the present application;
Fig. 5 a-5b is the flow chart of another application testing method disclosed in the embodiment of the present application;
Fig. 6 a-6b is the flow chart of another application testing method disclosed in the embodiment of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
Term is explained:
Application is the one or more application before execution fractionation or union operation before changing.
It is applied after change to execute the one or more application after fractionation or union operation.
In order to facilitate the understanding of those skilled in the art, this application provides a kind of embodiment one of application test systems and in fact Apply example two.
It is the embodiment one of application test systems, including equipment 100 before changing referring to Fig. 1 a, with 100 phase of equipment before changing Equipment 200 after change even, and, the background devices 300 being connected with equipment 200 after equipment 100 before changing and change.
It is the embodiment two of application test systems referring to Fig. 1 b, what is different from the first embodiment is that increasing and the change The connected storage equipment 400 of equipment 200 afterwards.
In example 1 and example 2, it can directly be counted between equipment 200 after equipment 100 and change before changing According to interaction.Transfer can be increased when being not easy between equipment 200 after equipment 100 before changing and change and directly carrying out data interaction Equipment, to carry out data relay and storage between equipment after equipment 100 before changing and change.
Wherein, before changing equipment 100 be provided with first entrance apply and apply before changing, equipment 200 is provided with after change It is applied after second entrance application and change.After to application changes before changing, it is also desirable to be fitted to first entrance application Answering property adjusts, and the first entrance after being adaptively adjusted applies referred to as second entrance application.
The application is used for after the second entrance after change in equipment 200 is applied and changed using testing, with verifying The availability of equipment after change.
On the basis of above-mentioned application test systems, a kind of application testing method is provided.It is surveyed as shown in Fig. 2, introducing application Method for testing embodiment one, comprising the following steps:
Step S101: background devices building and respectively the application identities collection of transmission first entrance application progress intrinsic call, Application carries out the application identities collection of intrinsic call before changing, second entrance application carries out application identities collection and the change of intrinsic call Application carries out the application identities collection of intrinsic call afterwards.
User can based on the structure of equipment 100 before changing, in background devices 300 for equipment 100 before changing be arranged into The application identities collection of row intrinsic call, and equipment 100 before changing are sent to, so that equipment in the follow-up process, is based on before changing The application identities collection distinguishes intrinsic call or external call.
User can based on the structure of equipment 200 after change, in background devices 300 for change after equipment 200 be arranged into The application identities collection of row intrinsic call, and be sent to equipment 200 after change, so as to after changing equipment 200 in the follow-up process, base Intrinsic call or external call are distinguished in the application identities collection.
In order to make it easy to understand, the citing of equipment 200 after equipment 100 before changing and change is provided, to this step referring to Fig. 3 Suddenly it is described in detail.
Referring to Fig. 3, equipment 100 includes (being equivalent to a change using A (being equivalent to first entrance application), using B before changing More preceding application) and C (being equivalent to another to apply before changing) is applied, equipment 200 includes (being equivalent to second to enter using A ' after change Mouthful application), using D (be equivalent to change then apply).It is merged into using B and using C using D in this citing.
For this step S101, background devices 300 construct the application identities that first entrance application carries out intrinsic call Collection, and application identities collection is sent to first entrance application.
According to the citing of diagram 3, intrinsic call, the building packet of background devices 300 are belonged to when initiating and call to application B using A The application identities collection using B mark is included, the application identities collection of intrinsic call is carried out as application A, then sending includes marking using B The application identities collection of knowledge is to applying A.
For this step S101, background devices 300 construct the application identities collection that application before changing carries out intrinsic call, And application identities collection is sent to applying before changing.
According to the citing of diagram 3, intrinsic call is belonged to when initiating and call to application C using B (since application A receives entrance Request, so using B intrinsic call will not be initiated to application A again), the building of background devices 300 includes the application mark using C mark Know collection, the application identities collection of intrinsic call is carried out as application B, then sending includes the application identities collection using C mark to answering Use B.
So intrinsic call is not carried out using C, that is, answered according to the citing of diagram 3 using there is no other application behind C Integrated with the application identities for carrying out intrinsic call of C as empty set.Background devices 300 can send empty set to applying C.
For this step S101, background devices 300 construct the application identities that second entrance application carries out intrinsic call Collection, and application identities collection is sent to second entrance application.
According to the citing of diagram 3, intrinsic call, the building packet of background devices 300 are belonged to when initiating and call to application D using A ' The application identities collection using D mark is included, the application identities collection of intrinsic call is carried out as application A ', then sending includes applying D The application identities collection of mark is to applying A '.
For this step S101, the application identities collection for carrying out intrinsic call is applied after the building change of background devices 300, And it sends application identities collection and is applied to after changing.
According to the citing of diagram 3, applied before changing using D is subsequent without other, so the application of the intrinsic call using D Identification sets are empty set.Background devices 300 can send empty set to applying D.
Step S102: before changing equipment 100 receive real network environment in entry request, using first entrance apply and Entry request described in application execution before changing obtains the first feedback result corresponding with the entry request, sends entry request With corresponding first feedback result.
The application no longer uses automatized script to execute application test, but live network flow on line is used to be applied Test.Therefore, the first entrance application in equipment 100 before changing is set in real network environment by the application, so as to first Entrance application can receive the request (subsequent to be known as entry request) in real network environment.
First entrance application can execute entry request, can be to outside applications transmission during executing entry request Portion's call request executes external call, can also send intrinsic call request to application before changing and execute intrinsic call.
It, equally can also be outside during the intrinsic call request that the application of application execution first entrance before changing is sent Portion's application sends external call request and executes external call, can also send intrinsic call request to other applications before changing and execute Intrinsic call.
After all intrinsic call requests and external call are requested, first entrance application can obtain and entry request Corresponding first feedback result.
Step S1021: equipment 100 is applied and entry request described in application execution before changing using first entrance before changing During execute external call in the case where, record the external call sent to applications is requested first request into ginseng and What applications were sent returns the result, and sends described first and request into ginseng and return the result.
First entrance is applied with the application identities collection for carrying out intrinsic call, and first entrance, which is applied, is executing the process called In, judge that the purpose application identities in call request whether there is in application identities collection;It is answered if purpose application identities are present in With in identification sets, it is determined that it is intrinsic call that this, which is called, and otherwise determining that this is called is external call.
First entrance is applied after determining that this is called as external call, is recorded and is asked to the external call that applications are sent It asks and requests ginseng (distinguishing to enter ginseng with the request of equipment after change, subsequent referred to as first to request into ginseng), and record outside Using returning the result for transmission.
It is understood that first entrance application can execute multiple external call, executed so first entrance is applied During entry request, multiple first can be obtained and request into ginseng and corresponding return the result.Then multiple first are sent to ask It asks into ginseng and corresponding returns the result.
Similarly, application has the application identities collection for carrying out intrinsic call before changing, applies executing the mistake called before changing Cheng Zhong judges that the purpose application identities in call request whether there is in application identities collection;If purpose application identities are present in In application identities collection, it is determined that it is intrinsic call that this, which is called, and otherwise determining that this is called is external call.
It is applied after determining that this is called as external call before changing, records the external call request sent to applications In first request into ginseng, and record returning the result for applications transmission.
It is understood that application can execute multiple external call before changing, first is being executed so applying before changing During the intrinsic call request that entrance application is sent, multiple first can be obtained and request into ginseng and corresponding return the result. Then multiple first are sent to request into ginseng and corresponding return the result.
Step S103: after change equipment 200 obtain multiple first request into ginseng and it is corresponding return the result, and be stored in In storage equipment 400 or it is stored in itself memory space.
In the case where not having relay device between equipment after equipment 100 before changing and change, equipment 200 can after change Multiple first sent with directly receiving equipment before changing request into ginseng and corresponding return the result.
In the case where having relay device between equipment after equipment 100 before changing and change, equipment 200 can be with before changing Send multiple first request into ginseng and it is corresponding return the result to relay device, after change equipment 200 again from relay device obtain Multiple first request into ginseng and corresponding return the result.
In the embodiment shown in Fig. 1 a, equipment 200 can be requested in itself storage multiple first into ginseng and right after change That answers returns the result, to use in application test process.
In the embodiment shown in Fig. 1 b, equipment 200 can send multiple first and request into ginseng and corresponding return after change Return result to storage equipment 400, storage equipment 400 in store multiple first request into ginseng and it is corresponding return the result, rear In continuous application test data can be searched from storage equipment.
Embodiment shown in Fig. 1 b can alleviate the CPU pressure of equipment 200 after change, and equipment 200 is deposited after change When storage space is smaller, the storage pressure of equipment 200 after change can reduce.
It can request to tie into ginseng and corresponding return using distributed caching structure storage multiple first in storing process Fruit.Referring to chart 1, storage condition is illustrated:
Table 1
Type It requests into ginseng It returns the result
External call First requests into ginseng 1 Return the result 1
First requests into ginseng 2 Return the result 2
…… ……
First requests into ginseng N Return the result N
Step S104: equipment 200 obtains first entrance request and corresponding first feedback result after change.
In the case where not having relay device between equipment after equipment 100 before changing and change, equipment 200 can after change Directly to receive the first entrance request and corresponding first feedback result that equipment is sent before changing.
In the case where having relay device between equipment after equipment 100 before changing and change, equipment 200 can be with before changing First entrance request and corresponding first feedback result are sent to relay device, equipment 200 is obtained from relay device again after change First entrance request and corresponding first feedback result.
Step S105: entry request described in application execution after equipment 200 is applied and changed using second entrance after change obtains Obtain the second feedback result corresponding with the entry request.
Second entrance application can execute entry request, can be to outside applications transmission during executing entry request Portion's call request executes external call, can also be to executing intrinsic call using sending intrinsic call request after change.
It, equally can also be outside during the intrinsic call request that the application of application execution first entrance is sent after change Portion's application sends external call request and executes external call, can also be to executing using sending intrinsic call request after other changes Intrinsic call.
It is understood that since application change occurs after change in equipment, thus intrinsic call process with set before changing It is standby to will be different.For example, citing according to Fig.3, originally using identical two applications of A difference (using B and applying C) hair It send intrinsic call to request, only sends intrinsic call request to an application (applying D) now.
Since equipment 100 and equipment 200 after change are still consistent for applications before changing, so before changing After equipment 100 and change equipment 200 send external call request should be into ginseng it is constant, unlike, send external adjust It may be changed with the main body of request.
After all intrinsic call requests and external call are requested, second entrance application can obtain and entry request Corresponding second feedback result.
Step S1051: the entry request described in application execution after applying and changing using second entrance of equipment 200 after change In the case where executing external call in the process, obtains the external call sent to applications is requested second and request into ginseng, Multiple first, which request that participation is corresponding, returns the result, and finds and requests to return the result into ginseng is corresponding with described second, and To external call request feedback, this is returned the result.
Second entrance is applied with the application identities collection for carrying out intrinsic call, and second entrance, which is applied, is executing the process called In, judge that the purpose application identities in call request whether there is in application identities collection;It is answered if purpose application identities are present in With in identification sets, it is determined that it is intrinsic call that this, which is called, and otherwise determining that this is called is external call.
Second entrance is applied after determining that this is called as external call, is obtained and is asked to the external call that applications are sent Second asked is requested into ginseng.Multiple first request that participation is corresponding and return the result shown in the table 1, search and the second request Enter to join it is corresponding return the result, and return the result returning to external call request using this.
Similarly, it is applied after change using with the application identities collection for carrying out intrinsic call in the mistake for executing calling after change Cheng Zhong judges that the purpose application identities in call request whether there is in application identities collection;If purpose application identities are present in In application identities collection, it is determined that it is intrinsic call that this, which is called, and otherwise determining that this is called is external call.
It is applied after change after determining that this is called as external call, obtains the external call request sent to applications Second request into ginseng.Multiple first request that participation is corresponding and return the result shown in the table 1, search with second request into Join it is corresponding return the result, and return the result returning to external call request using this.
It should be one since the request for the external call request that equipment 100 is sent with equipment 200 after change before changing enters ginseng It causes.For example, equipment 100 and equipment 200 after change are executing the entrance for obtaining the order status of order number " 12345 " before changing In request process, the inquiry request of the order status of order number " 12345 " can be sent to Third Party Logistics System.
Therefore, equipment 100 before changing execute that multiple first generated during external call request should in ginseng Have and request to request into ginseng into ginseng is consistent with second, that is, equipment 200 can be found in table 1 after changing requests with second into ginseng Consistent first requests into ginseng, and obtains corresponding return the result.
It requests to return the result feedback external call into ginseng is corresponding with second using finding in the present embodiment, rather than External call request really is sent to applications as equipment 100 before changing.
The present embodiment avoids equipment 200 after change from really sending external call request to applications, its object is to: by True external call is occurred to applications in equipment 100 before changing, if equipment 200 is sent out to applications again after change Raw true external call, may cause many problems.
For example, equipment 100 and equipment 200 after change create the same order to ordering system respectively before changing, then can draw It plays ordering system and repeated order problem occurs.
For another example, equipment 100 to ordering system searches a wrong order number (1245) before changing, and changes wrong order Number is that correct order number code (12345) can then look into if equipment 100 also really executes after change because of ordering system It can not find wrong order number (1245), and send false alarm.
Step S106: equipment 200 compares first feedback result after change and second feedback result is tested As a result.
Although equipment 200 still can be real after change it is understood that application change occurs for equipment 200 after change The now business function that equipment is realized before changing.
Therefore, theoretically after change using in correct situation, equipment 200 is executing identical entry request after change The second obtained feedback result, it should which executing the first feedback result that identical entry request obtains with equipment 100 before changing is It is consistent.
Therefore, equipment 200 compares the first feedback result and the second feedback result after change, in the first feedback result and second Under feedback result unanimous circumstances, pass through after determining change using test.Conversely, equipment 200 is in the first feedback result after change With the second feedback result it is inconsistent in the case where, passes through after determining change using not testing.
Equipment 200 can export and show test result after change, so that user checks test result.
By foregoing description, it can learn that the present embodiment has the following beneficial effects:
The application using the request (i.e. true test case) in real network environment to after change using testing, So being not necessarily to manual maintenance test case, testing efficiency can be improved;Also, the request in real network environment can cover respectively Kind application scenarios, so test coverage is higher.
On the basis of above-mentioned application test systems, a kind of application testing method is provided.It is surveyed as shown in figure 4, introducing application Method for testing embodiment two.
Embodiment two on the basis of embodiment one, increasing step S1022 in step s 102, adjust in inside before changing by equipment The schedule parameter of intrinsic call progress is indicated with record in the process;Before step S104, device authentication is changed after increasing change Whether preceding 100 intrinsic call of equipment is finished.
Since the implementation procedure that first entrance is applied and applied before changing in equipment 100 before changing is not synchronized, so, In order to guarantee that intrinsic call is completely finished by equipment before changing, equipment can verify the inside of equipment 100 before changing after change Call whether be finished, to prevent equipment before changing also have not been executed time-varying enter test process cause test do not pass through.
Step S1022 is described below and records the realization for indicating the schedule parameter of intrinsic call progress in internal calling process Process.
According to one embodiment provided by the present application, the first implementation of step S1022 is provided: being asked for intrinsic call It seeks distribution random number and sends the random number of intrinsic call request, intrinsic call request is sent after executing intrinsic call Random number.
It is then corresponding, device authentication the first realization that whether 100 intrinsic call of equipment is finished before changing after change Mode: several random numbers that the equipment before changing is used for intrinsic call are obtained, and several random numbers are executed into exclusive or behaviour Work obtains exclusive or as a result, if the exclusive or result is zero, enters the application execution after utilizing second entrance application and change The entry request step.
Referring to Fig. 5 a, before changing equipment 100 execute step S1022 process the following steps are included:
Step S501: equipment 100 is applied and entrance described in application execution before changing described using first entrance before changing During request, judge whether that intrinsic call occurs.
First entrance is applied after receiving entry request, judges that purpose application identities whether there is in progress intrinsic call In application identities collection, then it is determined as intrinsic call if it exists.
It is applied after receiving the intrinsic call request that first entrance application is sent before changing, whether judges purpose application identities It is present in the application identities collection for carrying out intrinsic call, is then determined as intrinsic call if it exists.
Step S502: before changing equipment 100 if it is determined that occur intrinsic call, then be intrinsic call request generate random number, And send the random number of intrinsic call request.
In order to make it easy to understand, this step is introduced in embodiment according to Fig.3,.
It is then two intrinsic call request distribution using A it is assumed that sending two intrinsic call requests to application B using A Random number is 0001 and 0010;An intrinsic call request is sent to application C using A, then is intrinsic call request point using A With random number 0011.
Using B after receiving the two intrinsic calls request sent using A, the random number of two intrinsic call request is recorded 0001 and 0010.Using B in executing intrinsic call request process, Xiang Yingyong C initiates an intrinsic call request, then applies B Random number 0100 can be generated.
The intrinsic call request record random number 0011 using A transmission is received using C, and is received using the interior of B transmission Portion's call request simultaneously records random number 0100.
Step S503: equipment 100 sends the random number of intrinsic call request after executing intrinsic call before changing.
After application B executes intrinsic call, transmits and receives using the random number 0001 and 0010 of A and itself generate To equipment 200 after random number 0100 to the change of application C.
Using C after executing intrinsic call, transmit and receive the random number 0011 using A and receive using B with Equipment 200 after machine number 0100 to change.
Certainly, intrinsic call request can be also executed other than recording random number using A, using B and application C, and in feedback Portion's call request is corresponding to be returned the result.It should be in the process mature technology, so not repeating in the present embodiment.
Referring to Fig. 5 b, after change equipment 200 execute verifying process the following steps are included:
Step S511: equipment 200 obtains the equipment before changing and is used for several random numbers of intrinsic call after change, and deposits Storage is into storage equipment or the memory space of itself.
Equipment 200 directly acquires several random numbers that equipment 100 is sent before changing after change, or obtains from relay device Several random numbers that equipment 100 generates before changing.In the embodiment shown in Fig. 1 a, several random numbers can be stored in change Itself memory space of equipment afterwards;In the embodiment shown in Fig. 1 b, several random numbers can be stored in storage equipment.
It is not consistent due to application A, using the time that B and application C execution intrinsic call terminate, it should be earliest using C It executes and completes intrinsic call, so equipment first receives and stores the random number 0011,0100 sent using C after change.Then, Receive the random number 0001,0010 and 0100 sent using B.Then, the random number 0001,0010 sent using A is received With 0011.
Referring to table 2, storage condition is illustrated:
Table 2
Step S512: equipment 200 executes xor operation to several random numbers and obtains exclusive or result after change.
All random numbers that equipment interconnection receives after change carry out xor operation and obtain exclusive or result.
Continue the example above, i.e., it is corresponding using B by the corresponding random number of application C in table 2 Random number execute xor operation with the corresponding random number of application A and obtain exclusive or result.That is,
Step S513: if the exclusive or result is zero, enter the application execution after utilizing second entrance application and change The step of entry request.
It is zero since the principle of xor operation is after two identical digital exclusive or, similarly, identical two groups of data Carrying out result when exclusive or is also zero.If missing any one number in one group of data, the exclusive or result of two groups of data all will not be Zero.
Since application each in equipment before changing can send itself received random number itself generated, (i.e. itself is obtained All random numbers) to change after equipment, so, theoretically, equipment before changing execute intrinsic call after, set after change It is standby to obtain several random numbers and be divided into two groups, and, two groups of random numbers are consistent (because the application of distribution random number and receiving random Several applications can send random number equipment to after changing).
Continue above-described embodiment, two groups of random numbers that equipment obtains after change: one group of random number is 0001,0010,0011 With 0100, another group of random number is also 0001,0010,0011 and 0100.Therefore, the random number that equipment interconnection receives after change into After row xor operation, xor operation zero.
An application does not complete intrinsic call wherein, then will not send random number equipment, equipment after change to after changing Just consistent two groups of random numbers can not be formed in obtained several random numbers, so exclusive or result non-zero.
Therefore, equipment 400 determines in equipment before changing in the exclusive or result non-zero for detecting several random numbers after change Portion calls and is also not finished, then waits for a period of time.If the exclusive or result for detecting several random numbers is zero, determination is set before changing Standby intrinsic call is over, and is asked into using into described using entrance described in application execution after second entrance application and change The step of asking.
According to another embodiment provided by the present application, second of implementation of step S1022 is provided: for intrinsic call Request distribution random number simultaneously sends the exclusive or for the random number that intrinsic call is requested as a result, after executing intrinsic call in transmission The exclusive or result of the random number of portion's call request.
It is then corresponding, device authentication the first realization that whether 100 intrinsic call of equipment is finished before changing after change Mode: the exclusive or of several random numbers for intrinsic call of equipment before changing is obtained as a result, and again by several exclusive or results It executes xor operation and obtains exclusive or as a result, answering if being zero if the exclusive or result into described using second entrance application and after changing With the execution entry request step.
Referring to Fig. 6 a, before changing equipment 100 execute step S1022 process the following steps are included:
Step S601: during the utilization first entrance is applied with entry request described in application execution before changing, Judge whether that intrinsic call occurs.
Step S602: if it is determined that intrinsic call occurs, then request to generate random number for intrinsic call and sends intrinsic call The exclusive or result of the random number of request.
Step S603: the exclusive or result of the random number of intrinsic call request is sent after executing intrinsic call.
Continue the example above, equipment receives and stores the exclusive or using the C random number 0011 and 0100 sent after change As a result 0111;Receive the exclusive or result 0111 using the B random number 0001,0010 and 0100 sent;It receives and is sent using A Random number 0001,0010 and 0011 exclusive or result 0000.
Referring to Fig. 6 b, after change equipment 200 execute verifying process the following steps are included:
Step S611: the exclusive or of several random numbers for intrinsic call of equipment before changing is obtained as a result, and storing Into storage equipment or the memory space of itself.
Referring to table 3, storage condition is illustrated:
Table 3
Step S612: xor operation is executed to several exclusive or results again and obtains exclusive or result.
It is determined by xor operation characteristic, as long as two groups of original data are consistent, no matter the number of xor operation and front and back Sequentially, finally obtaining an exclusive or result should be zero.Except missing random number in two groups of non-primary data.
Step S613: if the exclusive or result is zero, enter the application execution after utilizing second entrance application and change The step of entry request.
For the present embodiment embodiment shown in Fig. 5 b, can only be stored in this implementation exclusive or result can rather than Each random number is stored, so less memory space can be occupied in the present embodiment.
If function described in the present embodiment method is realized in the form of SFU software functional unit and as independent product pin It sells or in use, can store in a storage medium readable by a compute device.Based on this understanding, the embodiment of the present application The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, this is soft Part product is stored in a storage medium, including some instructions are used so that calculating equipment (it can be personal computer, Server, mobile computing device or network equipment etc.) execute all or part of step of each embodiment the method for the application Suddenly.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), deposits at random The various media that can store program code such as access to memory (RAM, Random Access Memory), magnetic or disk.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with it is other The difference of embodiment, same or similar part may refer to each other between each embodiment.
The foregoing description of the disclosed embodiments makes professional and technical personnel in the field can be realized or use the application. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the application.Therefore, the application It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (20)

1. a kind of application test systems characterized by comprising
Equipment before changing is applied using first entrance and is applied before changing for receiving the entry request in real network environment It executes the entry request, obtains the first feedback result corresponding with the entry request, send the entry request and described First feedback result;
Equipment after change is applied and is changed using second entrance for obtaining the entry request and first feedback result Entry request described in application execution afterwards obtains the second feedback result corresponding with the entry request, compares first feedback As a result test result is obtained with second feedback result;
Wherein, the application before changing is applied after the change to execute the one or more application before fractionation or union operation To execute the one or more application after fractionation or union operation.
2. the system as claimed in claim 1, which is characterized in that
The equipment before changing is also used to applying the process with entry request described in application execution before changing using first entrance In the case where middle execution intrinsic call, random number is distributed for intrinsic call request and sends the random number of intrinsic call request, The random number of intrinsic call request is sent after executing intrinsic call;
Equipment after the change is also used to obtain several random numbers that the equipment before changing is used for intrinsic call, and will be described Several random numbers execute xor operation and obtain exclusive or as a result, if the exclusive or result is zero, utilize second entrance into described Using and change after entry request step described in application execution.
3. the system as claimed in claim 1, which is characterized in that
The equipment before changing is also used to applying the process with entry request described in application execution before changing using first entrance In the case where middle execution intrinsic call, for intrinsic call request distribution random number and the different of the random number that intrinsic call is requested is sent Or as a result, the exclusive or result of the random number of intrinsic call request is sent after executing intrinsic call;
Equipment after the change is also used to obtain the exclusive or knot of several random numbers for intrinsic call of equipment before changing Fruit, and several exclusive or results are executed into xor operation again and obtain exclusive or as a result, if the exclusive or result is zero, enter the utilization Entry request step described in application execution after second entrance application and change.
4. the system as claimed in claim 1, which is characterized in that
The equipment before changing is also used to applying the process with entry request described in application execution before changing using first entrance In the case where middle execution external call, records the external call sent to applications is requested first and request to answer into ginseng and outside With returning the result for transmission, and sends described first and request into ginseng and return the result;
Equipment after the change, during being also used to the entry request described in application execution after applying and change using second entrance It in the case where executing external call, obtains the external call sent to applications is requested second and requests into ginseng, multiple the One, which request that participation is corresponding, returns the result, and finds and requests to return the result into ginseng is corresponding with described second, and to described External call request is fed back this and is returned the result.
5. the system as claimed in claim 1, which is characterized in that further include:
With the background devices that are connected of equipment after the equipment before changing and change, the first entrance is sent for building and respectively The application identities collection of intrinsic call, described second are carried out using the application identities collection of progress intrinsic call, the application before changing Using the application identities collection for carrying out intrinsic call after the application identities collection of entrance application progress intrinsic call and the change;
The first entrance application of the equipment before changing is also used to receive and store the background devices are sent described first and enters Mouth application carries out the application identities collection of intrinsic call, and during executing the entry request, is based on the first entrance Using the application identities collection for carrying out intrinsic call, determine that call request is that external call request or intrinsic call are requested;
The application before changing of the equipment before changing is applied described in the background devices transmission before changing for receiving and storing The application identities collection of intrinsic call is carried out, and during executing the entry request, is carried out based on the application before changing The application identities collection of intrinsic call determines that call request is that external call request or intrinsic call are requested;
The second entrance application of equipment after the change is also used to receive and store the background devices are sent described second and enters Mouth application carries out the application identities collection of intrinsic call, and during executing the entry request, is based on the second entrance Using the application identities collection for carrying out intrinsic call, determine that call request is that external call request or intrinsic call are requested;
It is applied after the change of equipment after the change, for being applied after receiving and storing the change that the background devices are sent The application identities collection of intrinsic call is carried out, and during executing the entry request, is carried out based on being applied after the change The application identities collection of intrinsic call determines that call request is that external call request or intrinsic call are requested.
6. system as claimed in claim 4, which is characterized in that further include being asked with first entrance described in equipment after the change It sums after the change using connected storage equipment;
Equipment is also used to receive and sends multiple first that the equipment before changing is sent to the storage equipment after the change It requests into ginseng and corresponding returns the result;
The background devices are requested into ginseng and corresponding are returned the result for storing multiple the first of the equipment before changing;
During then equipment is requested that participation is corresponding and returned the result multiple first after the change, find and second request Enter to join it is corresponding return the result, specifically include: being found from the storage equipment and request to return into ginseng is corresponding with described second Return result.
7. a kind of application testing method characterized by comprising
It applies in equipment utilization first entrance before changing and the entry request in application execution real network environment and obtains before changing After obtaining the first feedback result, the entry request is obtained;
Entry request described in application execution after applying and change using second entrance, and obtain corresponding with the entry request the Two feedback results;
It compares first feedback result and second feedback result and obtains test result;
Wherein, the application before changing is applied after the change to execute the one or more application before fractionation or union operation To execute the one or more application after fractionation or union operation.
8. the method for claim 7, which is characterized in that in the application execution after utilizing second entrance application and change Before the entry request, further includes:
Obtain the exclusive or result of several random numbers for intrinsic call of equipment before changing;
Xor operation is executed to several exclusive or results again and obtains exclusive or result;
If the exclusive or result is zero, enter it is described using second entrance apply and change after entry request described in application execution Step.
9. the method for claim 7, which is characterized in that in the application execution after utilizing second entrance application and change Before the entry request, further includes:
Obtain several random numbers that the equipment before changing is used for intrinsic call;
Xor operation is executed to several random numbers and obtains exclusive or result;
If the exclusive or result is zero, enter it is described using second entrance apply and change after entry request described in application execution Step.
10. the method for claim 7, which is characterized in that described to utilize application execution after second entrance application and change The entry request, comprising:
It is described apply and change using second entrance after entry request described in application execution during, judge whether to occur outer It calls in portion;
Determine occur external call in the case where, obtain to applications send external call request second request into Ginseng;
In requesting that participation is corresponding multiple first and return the result, finds and request to tie into the corresponding return of ginseng with described second Fruit, and this is returned the result to external call request feedback;
Wherein, it the multiple first requests to ask for the equipment before changing in the execution entrance into ginseng and corresponding return the result It is generated in the case of generation external call during asking.
11. method as claimed in claim 10, which is characterized in that further include receiving and storing the application for becoming and carrying out intrinsic call Identification sets;
It is then described to judge whether that external call occurs, comprising:
Judge that the purpose application identities of call request whether there is in the application identities collection;
If it does not exist in the application identities collection, it is determined that external call occurs, the call request is external call request.
12. a kind of application testing method characterized by comprising
Receive the entry request in real network environment;
It is applied using first entrance and entry request described in application execution before changing, and obtains corresponding with the entry request the One feedback result;
The entry request and first feedback result are sent, so that equipment executes the entry request and obtains the after change Two feedback results compare first feedback result and second feedback result and obtain test result;
Wherein, the application before changing is applied after the change to execute the one or more application before fractionation or union operation To execute the one or more application after fractionation or union operation.
13. method as claimed in claim 12, which is characterized in that further include:
During the utilization first entrance is applied with entry request described in application execution before changing, judge whether in generation It calls in portion;
If it is determined that intrinsic call occurs, then request to generate random number for intrinsic call and sends the random number that intrinsic call is requested Exclusive or result;
The exclusive or result of the random number of intrinsic call request is sent after executing intrinsic call.
14. method as claimed in claim 12, which is characterized in that further include:
During the utilization first entrance is applied with entry request described in application execution before changing, judge whether in generation It calls in portion;
If it is determined that intrinsic call occurs, then request to generate random number for intrinsic call, and send the random number of intrinsic call request;
The random number of intrinsic call request is sent after executing intrinsic call.
15. method as claimed in claim 13, which is characterized in that described to send intrinsic call after executing intrinsic call The exclusive or result of the random number of request, comprising:
The first entrance apply for intrinsic call request distribution random number and send comprising random number intrinsic call request to It is described to apply before changing, after first entrance application obtains first feedback result, send intrinsic call request with The exclusive or result of machine number;
Application receives requesting comprising random number intrinsic call for the first entrance application transmission before changing, and internal tune is not occurring In the case where, after executing the interior call request, the exclusive or result of the random number of intrinsic call request is sent;
Application receives requesting comprising random number intrinsic call for the first entrance application transmission before changing, and intrinsic call is occurring In the case where, for intrinsic call request distribution random number and transmission requests to another to answer before changing comprising the intrinsic call of random number With the exclusive or result for the random number that transmission intrinsic call is requested after call request in executing.
16. method according to claim 13 or 14, which is characterized in that further include receiving and storing change to carry out intrinsic call Application identities collection;
It is then described to judge whether that intrinsic call occurs, comprising:
Judge that the purpose application identities of call request whether there is in the application identities collection;
If it exists in the application identities collection, it is determined that intrinsic call occurs, the call request is intrinsic call request.
17. a kind of application testing method characterized by comprising
Receive the entry request in real network environment;
It is applied and entry request described in application execution before changing, acquisition corresponding with the entry request first using first entrance Feedback result;
Entry request described in application execution, obtains corresponding with the entry request second after applying and change using second entrance Feedback result;
It compares first feedback result and second feedback result obtains test result;
Wherein, the application before changing is applied after the change to execute the one or more application before fractionation or union operation To execute the one or more application after fractionation or union operation.
18. method as claimed in claim 17, which is characterized in that further include:
The case where executing intrinsic call during applying using first entrance and entry request described in application execution before changing Under, random number is distributed for intrinsic call and records the exclusive or of the random number of intrinsic call as a result, after executing intrinsic call Record the exclusive or result of the random number of intrinsic call;
Several exclusive or results are executed into xor operation again and obtain exclusive or result;
If the exclusive or result is zero, walked into described using entry request described in application execution after second entrance application and change Suddenly.
19. method as claimed in claim 17, which is characterized in that further include:
The case where executing intrinsic call during applying using first entrance and entry request described in application execution before changing Under, random number is distributed for intrinsic call and records the random number of intrinsic call, is adjusted inside record after executing intrinsic call Random number;
Several random numbers are executed into xor operation and obtain exclusive or result;
If the exclusive or result is zero, walked into described using entry request described in application execution after second entrance application and change Suddenly.
20. method as claimed in claim 17, which is characterized in that further include:
The case where executing external call during applying using first entrance and entry request described in application execution before changing Under, it records the external call sent to applications is requested first and requests the return knot sent into ginseng and the applications Fruit;
In the case where executing external call during the entry request described in application execution after applying and change using second entrance, The external call sent to applications is requested second is obtained to request into ginseng;
In requesting that participation is corresponding multiple first and return the result, finds and request to tie into the corresponding return of ginseng with described second Fruit;
To external call request feedback, this is returned the result.
CN201710929387.2A 2017-10-09 2017-10-09 Application testing method and system Active CN109634832B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710929387.2A CN109634832B (en) 2017-10-09 2017-10-09 Application testing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710929387.2A CN109634832B (en) 2017-10-09 2017-10-09 Application testing method and system

Publications (2)

Publication Number Publication Date
CN109634832A true CN109634832A (en) 2019-04-16
CN109634832B CN109634832B (en) 2022-04-08

Family

ID=66051012

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710929387.2A Active CN109634832B (en) 2017-10-09 2017-10-09 Application testing method and system

Country Status (1)

Country Link
CN (1) CN109634832B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101996132A (en) * 2009-08-14 2011-03-30 中兴通讯股份有限公司 Method and device for automatically testing common object request broker architecture (CORBA) interfaces
US20120331353A1 (en) * 2005-11-22 2012-12-27 International Business Machines Corporation Testing a software application interfacing with multiple external software applications in a simulated test environment
CN103577907A (en) * 2012-07-24 2014-02-12 阿里巴巴集团控股有限公司 Continuous integration testing method and system
CN103902445A (en) * 2012-12-27 2014-07-02 中国移动通信集团吉林有限公司 Regression test object determination method and device
CN106708719A (en) * 2015-08-04 2017-05-24 阿里巴巴集团控股有限公司 Business function testing method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120331353A1 (en) * 2005-11-22 2012-12-27 International Business Machines Corporation Testing a software application interfacing with multiple external software applications in a simulated test environment
CN101996132A (en) * 2009-08-14 2011-03-30 中兴通讯股份有限公司 Method and device for automatically testing common object request broker architecture (CORBA) interfaces
CN103577907A (en) * 2012-07-24 2014-02-12 阿里巴巴集团控股有限公司 Continuous integration testing method and system
CN103902445A (en) * 2012-12-27 2014-07-02 中国移动通信集团吉林有限公司 Regression test object determination method and device
CN106708719A (en) * 2015-08-04 2017-05-24 阿里巴巴集团控股有限公司 Business function testing method and apparatus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
[美]克里斯.戴维斯: "《IT审计 管好信息资产 第2版》", 30 April 2015 *

Also Published As

Publication number Publication date
CN109634832B (en) 2022-04-08

Similar Documents

Publication Publication Date Title
CN108961052A (en) Verification method, storage method, device, equipment and the medium of block chain data
CN106572054B (en) Distributed lock service implementing method and device in distributed system
CN103002415B (en) A kind of method and apparatus by short message sending identifying code
CN106598824A (en) Performance analysis method and device for block chain
US9848089B2 (en) Methods and apparatus to generate an overall performance index
CN106713495B (en) The method for uploading and access method in IP geographical position, device and access system
CN109376172A (en) Data capture method and system based on block chain
CN106549878A (en) A kind of service shunting method and device
CN107347205A (en) A kind of network section system of selection, apparatus and system
CN104408640B (en) Application software recommends method and device
CN107360117B (en) Data processing method, device and system
CN106375458A (en) Service call system, method and device
CN107172177A (en) A kind of information recommendation method and device
CN116097734A (en) Method for determining business experience model and communication device
US9813549B2 (en) Voice service evaluation processing method and apparatus
CN106453349A (en) An account number login method and apparatus
CN109413202A (en) The ordering system and method for block chain Transaction Information
CN104239423B (en) A kind of relationship among persons are apart from acquisition methods and system
CN108112051A (en) A kind of method and apparatus for the access information that wireless access point is provided
CN106874289B (en) Associated node determination method and equipment
CN110288390A (en) Determine the method and device of address
CN106446050A (en) Method and system for subscription by aiming at changed data of database
CN105681266B (en) A kind of communication cluster method and device of mediaphone MMTel
CN105979567B (en) Determine method and apparatus, the system of the access information of WAP
CN108647315A (en) Collecting method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant