CN109634832A - Application testing method and system - Google Patents
Application testing method and system Download PDFInfo
- Publication number
- CN109634832A CN109634832A CN201710929387.2A CN201710929387A CN109634832A CN 109634832 A CN109634832 A CN 109634832A CN 201710929387 A CN201710929387 A CN 201710929387A CN 109634832 A CN109634832 A CN 109634832A
- Authority
- CN
- China
- Prior art keywords
- application
- request
- call
- result
- entrance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3684—Test management for test design, e.g. generating new test cases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3664—Environments for testing or debugging software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3688—Test management for test execution, e.g. scheduling of test suites
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
This application provides application testing method and system, one of application testing method includes: the entry request received in real network environment;It is applied using first entrance and entry request described in application execution before changing, and obtains the first feedback result corresponding with the entry request;The entry request and first feedback result are sent, so that equipment executes the entry request and the second feedback result of acquisition after change, first feedback result and second feedback result is compared and obtains test result.The application using the request (i.e. true test case) in real network environment to after change using testing, so being not necessarily to manual maintenance test case;Also, the request in real network environment can cover various application scenarios, so test coverage is higher.
Description
Technical field
This application involves field of communication technology more particularly to application testing method and systems.
Background technique
Currently, server have it is many apply (i.e. the application program of server-side), using can be used to implement business function.
It, can be (corresponding to the application execution change operation on server as the business such as business function, service traffics change on server
With execution fractured operation or to multiple application execution union operations) so that server preferably provides service.
For example, by taking two business functions are realized in server one application as an example, it, should when the service traffics of the application increase
Using be not enough to realize two business functions;The application can be split as to two applications, so as to by two business in the case of this
Function is distributed to two applications after splitting.
Such as: by taking the order of server is using upper realization order processing function and preferential distribution function as an example, server is risen
The service traffics of step section are smaller, so order application can be with execution of order processing function and preferential distribution function.With industry
Order application can be split as the order application of only execution of order processing function and execute preferential distribution function by the increase of business flow
The preferential distribution application of energy.
For example, being found in practical applications, this two so that two applications of server realize two business functions respectively as an example
A business function can reach more dominance energy or more preferable user experience when being used in combination, can close two business functions in the case of this
And into an application.
Such as: realize that order inquiries function is answered in order in logistics enquiring application with the logistics enquiring function of server
With middle realization, find that response speed can be promoted when order inquiries function and logistics enquiring function merge in practical applications
And user experience, it is possible to logistics enquiring be applied and an application is merged into order application.
It is understood that executing using change operation in server (to application execution fractured operation or to multiple applications
Execute union operation) after, need to after change using testing, to verify the availability applied after change.
Existing testing scheme predominantly by automatic test script to after change using testing.But automatic test
Script scheme needs artificial constantly maintenance test use-case, and the corresponding application scenarios of test case are limited, not can guarantee test
Coverage rate.
Summary of the invention
In consideration of it, the application provides application testing method and system, it can be to the request utilized in real network environment (i.e.
True test case) to after change using testing, so being not necessarily to manual maintenance test case;Also, live network ring
Request in border can cover various application scenarios, so test coverage is higher.
This application provides following technical characteristics to achieve the goals above:
A kind of application test systems, comprising:
Equipment before changing, for receiving the entry request in real network environment, using first entrance apply and before changing
Entry request described in application execution obtains corresponding with the entry request the first feedback result, send the entry request with
First feedback result;
Equipment after change, for obtaining the entry request and first feedback result, using second entrance apply and
Entry request described in application execution after change obtains the second feedback result corresponding with the entry request, comparison described first
Feedback result and second feedback result obtain test result;
Wherein, described application is executes the one or more application before fractionation or union operation before changing, after the change
Using for execute split or union operation after one or more application.
Optionally, the equipment before changing is also used to applying using first entrance and entering described in application execution before changing
In the case where executing intrinsic call during mouth request, random number is distributed for intrinsic call request and sends intrinsic call request
Random number, after executing intrinsic call send intrinsic call request random number;
Equipment after the change is also used to obtain several random numbers that the equipment before changing is used for intrinsic call, and will
Several random numbers execute xor operation and obtain exclusive or as a result, if the exclusive or result is zero, utilize second into described
Entry request step described in application execution after entrance application and change.
Optionally, the equipment before changing is also used to applying using first entrance and entering described in application execution before changing
In the case where executing intrinsic call during mouth request, random number is distributed for intrinsic call request and sends intrinsic call request
Random number exclusive or as a result, after executing intrinsic call send intrinsic call request random number exclusive or result;
Equipment after the change is also used to obtain the exclusive or of several random numbers for intrinsic call of equipment before changing
As a result, and several exclusive or results are executed xor operation acquisition exclusive or again as a result, entering the benefit if the exclusive or result is zero
Entry request step described in application execution after being applied and changed with second entrance.
Optionally, the equipment before changing is also used to applying using first entrance and entering described in application execution before changing
In the case where executing external call during mouth request, records the external call sent to applications is requested first and request
Enter that ginseng and applications send returns the result, and sends described first and request into ginseng and return the result;
Equipment after the change is also used to the entry request mistake described in application execution after applying and changing using second entrance
In the case where executing external call in journey, obtains the external call sent to applications is requested second and request into ginseng, more
A first, which request that participation is corresponding, returns the result, and finds and requests to return the result into ginseng is corresponding with described second, and to
The external call request is fed back this and is returned the result.
Optionally, further includes:
With the background devices that are connected of equipment after the equipment before changing and change, described first is sent for building and respectively
Entrance application carries out the application identities collection of intrinsic call, the application before changing carries out the application identities collection, described of intrinsic call
Using the application identities collection for carrying out intrinsic call after the application identities collection of second entrance application progress intrinsic call and the change;
The first entrance application of the equipment before changing, is also used to receive and store that the background devices send described the
The application of one entrance carries out the application identities collection of intrinsic call, and during executing the entry request, is based on described first
Entrance application carries out the application identities collection of intrinsic call, determines that call request is that external call request or intrinsic call are requested;
The application before changing of the equipment before changing, for receiving and storing described in the background devices transmission before changing
Using the application identities collection for carrying out intrinsic call, and during executing the entry request, applied before changing based on described
The application identities collection for carrying out intrinsic call determines that call request is that external call request or intrinsic call are requested;
The second entrance application of equipment after the change, is also used to receive and store that the background devices send described the
The application of two entrances carries out the application identities collection of intrinsic call, and during executing the entry request, is based on described second
Entrance application carries out the application identities collection of intrinsic call, determines that call request is that external call request or intrinsic call are requested;
It is applied after the change of equipment after the change, after receiving and storing the change that the background devices are sent
Using the application identities collection for carrying out intrinsic call, and during executing the entry request, based on being applied after the change
The application identities collection for carrying out intrinsic call determines that call request is that external call request or intrinsic call are requested.
Optionally, further include with after the change first entrance described in equipment request and the change after apply be connected
Store equipment;
Equipment is also used to receive and sends the multiple of the transmission of equipment before changing to the storage equipment after the change
First requests into ginseng and corresponding returns the result;
The background devices request to tie into ginseng and corresponding return for storing multiple the first of the equipment before changing
Fruit;
During then equipment is requested that participation is corresponding and returned the result multiple first after the change, find and described second
Request to return the result into ginseng is corresponding, specifically include: found from the storage equipment requested with described second it is corresponding into ginseng
Return the result.
A kind of application testing method, comprising:
It is applied and the entry request in application execution real network environment before changing in equipment utilization first entrance before changing
And after obtaining the first feedback result, the entry request is obtained;
Entry request described in application execution after applying and change using second entrance, and obtain corresponding with the entry request
The second feedback result;
It compares first feedback result and second feedback result and obtains test result;
Wherein, described application is executes the one or more application before fractionation or union operation before changing, after the change
Using for execute split or union operation after one or more application.
Optionally, it after described using second entrance application and change before entry request described in application execution, also wraps
It includes:
Obtain the exclusive or result of several random numbers for intrinsic call of equipment before changing;
Xor operation is executed to several exclusive or results again and obtains exclusive or result;
If the exclusive or result is zero, asked into described using entrance described in application execution after second entrance application and change
The step of asking.
Optionally, it after described using second entrance application and change before entry request described in application execution, also wraps
It includes:
Obtain several random numbers that the equipment before changing is used for intrinsic call;
Xor operation is executed to several random numbers and obtains exclusive or result;
If the exclusive or result is zero, asked into described using entrance described in application execution after second entrance application and change
The step of asking.
It is optionally, described to utilize entry request described in application execution after second entrance application and change, comprising:
During the entry request described in application execution after the utilization second entrance is applied and changed, judge whether to send out
Raw external call;
In the case where determining generation external call, the second request that the external call sent to applications is requested is obtained
Enter ginseng;
In requesting that participation is corresponding multiple first and return the result, finds and request to return into ginseng is corresponding with described second
It returns as a result, and this is returned the result to external call request feedback;
Wherein, the multiple first ginseng and corresponding return the result is requested to enter described in the execution for the equipment before changing
It is generated in the case of generation external call during mouth request.
It optionally, further include receiving and storing the application identities collection for becoming and carrying out intrinsic call;
It is then described to judge whether that external call occurs, comprising:
Judge that the purpose application identities of call request whether there is in the application identities collection;
If it does not exist in the application identities collection, it is determined that external call occurs, the call request is external call
Request.
A kind of application testing method, comprising:
Receive the entry request in real network environment;
It is applied and entry request described in application execution before changing, and obtained corresponding with the entry request using first entrance
The first feedback result;
The entry request and first feedback result are sent, for the equipment execution entry request after change and is obtained
The second feedback result is obtained, first feedback result and second feedback result are compared and obtains test result;
Wherein, described application is executes the one or more application before fractionation or union operation before changing, after the change
Using for execute split or union operation after one or more application.
Optionally, further includes:
During the utilization first entrance is applied with entry request described in application execution before changing, judge whether to send out
Raw intrinsic call;
If it is determined that intrinsic call occurs, then request to generate random number for intrinsic call and sends the random of intrinsic call request
Several exclusive or results;
The exclusive or result of the random number of intrinsic call request is sent after executing intrinsic call.
Optionally, further includes:
During the utilization first entrance is applied with entry request described in application execution before changing, judge whether to send out
Raw intrinsic call;
If it is determined that occur intrinsic call, then be intrinsic call request generate random number, and send intrinsic call request with
Machine number;
The random number of intrinsic call request is sent after executing intrinsic call.
Optionally, the exclusive or of the random number that intrinsic call request is sent after executing intrinsic call is as a result, packet
It includes:
The first entrance applies as intrinsic call request distribution random number and transmission is asked comprising the intrinsic call of random number
It asks to described and applies before changing, after first entrance application obtains first feedback result, send intrinsic call request
Random number exclusive or result;
Application receives requesting comprising random number intrinsic call for the first entrance application transmission before changing, in not occurring
In the case that portion is called, after executing the interior call request, the exclusive or result of the random number of intrinsic call request is sent;
Application receives requesting comprising random number intrinsic call for the first entrance application transmission before changing, inside generation
In the case where calling, for intrinsic call request distribution random number and transmission is requested comprising the intrinsic call of random number to another change
Preceding application sends the exclusive or result of the random number of intrinsic call request in executing after call request.
It optionally, further include receiving and storing the application identities collection for becoming and carrying out intrinsic call;
It is then described to judge whether that intrinsic call occurs, comprising:
Judge that the purpose application identities of call request whether there is in the application identities collection;
If it exists in the application identities collection, it is determined that intrinsic call occurs, the call request is asked for intrinsic call
It asks.
A kind of application testing method, comprising:
Receive the entry request in real network environment;
It is applied using first entrance and entry request described in application execution, acquisition is corresponding with the entry request before changing
First feedback result;
Entry request described in application execution, obtains corresponding with the entry request after applying and change using second entrance
Second feedback result;
It compares first feedback result and second feedback result obtains test result;
Wherein, described application is executes the one or more application before fractionation or union operation before changing, after the change
Using for execute split or union operation after one or more application.
Optionally, further includes:
Intrinsic call is executed during applying using first entrance and entry request described in application execution before changing
In the case of, random number is distributed for intrinsic call and records the exclusive or of the random number of intrinsic call as a result, executing intrinsic call knot
The exclusive or result of the random number of intrinsic call is recorded after beam;
Several exclusive or results are executed into xor operation again and obtain exclusive or result;
If the exclusive or result is zero, asked into described using entrance described in application execution after second entrance application and change
Seek step.
Optionally, further includes:
Intrinsic call is executed during applying using first entrance and entry request described in application execution before changing
In the case of, random number is distributed for intrinsic call and records the random number of intrinsic call, after executing intrinsic call in record
The random number that portion is called;
Several random numbers are executed into xor operation and obtain exclusive or result;
If the exclusive or result is zero, asked into described using entrance described in application execution after second entrance application and change
Seek step.
Optionally, further includes:
External call is executed during applying using first entrance and entry request described in application execution before changing
In the case of, it records the external call sent to applications is requested first and requests the return sent into ginseng and the applications
As a result;
The feelings of external call are executed during the entry request described in application execution after applying and change using second entrance
Under condition, obtains the external call sent to applications is requested second and request into ginseng;
In requesting that participation is corresponding multiple first and return the result, finds and request to return into ginseng is corresponding with described second
Return result;
To external call request feedback, this is returned the result.By the above technological means, may be implemented following beneficial to effect
Fruit:
It is input to before changing using the request (i.e. true test case) in real network environment using simultaneously in the application
The first feedback result is obtained, then the request in real network environment is input to after change using testing, and obtains the
Two feedback results.The first feedback result and second feedback result are compared to verify the availability applied after change.
The application using the request (i.e. true test case) in real network environment to after change using testing,
So being not necessarily to manual maintenance test case;Also, the request in real network environment can cover various application scenarios, so surveying
It is higher to try coverage rate.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 a-1b is a kind of structural schematic diagram of application test systems disclosed in the embodiment of the present application;
Fig. 2 is a kind of flow chart of application testing method disclosed in the embodiment of the present application;
Fig. 3 is the structural schematic diagram of another application test systems disclosed in the embodiment of the present application;
Fig. 4 is the flow chart of another application testing method disclosed in the embodiment of the present application;
Fig. 5 a-5b is the flow chart of another application testing method disclosed in the embodiment of the present application;
Fig. 6 a-6b is the flow chart of another application testing method disclosed in the embodiment of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
Term is explained:
Application is the one or more application before execution fractionation or union operation before changing.
It is applied after change to execute the one or more application after fractionation or union operation.
In order to facilitate the understanding of those skilled in the art, this application provides a kind of embodiment one of application test systems and in fact
Apply example two.
It is the embodiment one of application test systems, including equipment 100 before changing referring to Fig. 1 a, with 100 phase of equipment before changing
Equipment 200 after change even, and, the background devices 300 being connected with equipment 200 after equipment 100 before changing and change.
It is the embodiment two of application test systems referring to Fig. 1 b, what is different from the first embodiment is that increasing and the change
The connected storage equipment 400 of equipment 200 afterwards.
In example 1 and example 2, it can directly be counted between equipment 200 after equipment 100 and change before changing
According to interaction.Transfer can be increased when being not easy between equipment 200 after equipment 100 before changing and change and directly carrying out data interaction
Equipment, to carry out data relay and storage between equipment after equipment 100 before changing and change.
Wherein, before changing equipment 100 be provided with first entrance apply and apply before changing, equipment 200 is provided with after change
It is applied after second entrance application and change.After to application changes before changing, it is also desirable to be fitted to first entrance application
Answering property adjusts, and the first entrance after being adaptively adjusted applies referred to as second entrance application.
The application is used for after the second entrance after change in equipment 200 is applied and changed using testing, with verifying
The availability of equipment after change.
On the basis of above-mentioned application test systems, a kind of application testing method is provided.It is surveyed as shown in Fig. 2, introducing application
Method for testing embodiment one, comprising the following steps:
Step S101: background devices building and respectively the application identities collection of transmission first entrance application progress intrinsic call,
Application carries out the application identities collection of intrinsic call before changing, second entrance application carries out application identities collection and the change of intrinsic call
Application carries out the application identities collection of intrinsic call afterwards.
User can based on the structure of equipment 100 before changing, in background devices 300 for equipment 100 before changing be arranged into
The application identities collection of row intrinsic call, and equipment 100 before changing are sent to, so that equipment in the follow-up process, is based on before changing
The application identities collection distinguishes intrinsic call or external call.
User can based on the structure of equipment 200 after change, in background devices 300 for change after equipment 200 be arranged into
The application identities collection of row intrinsic call, and be sent to equipment 200 after change, so as to after changing equipment 200 in the follow-up process, base
Intrinsic call or external call are distinguished in the application identities collection.
In order to make it easy to understand, the citing of equipment 200 after equipment 100 before changing and change is provided, to this step referring to Fig. 3
Suddenly it is described in detail.
Referring to Fig. 3, equipment 100 includes (being equivalent to a change using A (being equivalent to first entrance application), using B before changing
More preceding application) and C (being equivalent to another to apply before changing) is applied, equipment 200 includes (being equivalent to second to enter using A ' after change
Mouthful application), using D (be equivalent to change then apply).It is merged into using B and using C using D in this citing.
For this step S101, background devices 300 construct the application identities that first entrance application carries out intrinsic call
Collection, and application identities collection is sent to first entrance application.
According to the citing of diagram 3, intrinsic call, the building packet of background devices 300 are belonged to when initiating and call to application B using A
The application identities collection using B mark is included, the application identities collection of intrinsic call is carried out as application A, then sending includes marking using B
The application identities collection of knowledge is to applying A.
For this step S101, background devices 300 construct the application identities collection that application before changing carries out intrinsic call,
And application identities collection is sent to applying before changing.
According to the citing of diagram 3, intrinsic call is belonged to when initiating and call to application C using B (since application A receives entrance
Request, so using B intrinsic call will not be initiated to application A again), the building of background devices 300 includes the application mark using C mark
Know collection, the application identities collection of intrinsic call is carried out as application B, then sending includes the application identities collection using C mark to answering
Use B.
So intrinsic call is not carried out using C, that is, answered according to the citing of diagram 3 using there is no other application behind C
Integrated with the application identities for carrying out intrinsic call of C as empty set.Background devices 300 can send empty set to applying C.
For this step S101, background devices 300 construct the application identities that second entrance application carries out intrinsic call
Collection, and application identities collection is sent to second entrance application.
According to the citing of diagram 3, intrinsic call, the building packet of background devices 300 are belonged to when initiating and call to application D using A '
The application identities collection using D mark is included, the application identities collection of intrinsic call is carried out as application A ', then sending includes applying D
The application identities collection of mark is to applying A '.
For this step S101, the application identities collection for carrying out intrinsic call is applied after the building change of background devices 300,
And it sends application identities collection and is applied to after changing.
According to the citing of diagram 3, applied before changing using D is subsequent without other, so the application of the intrinsic call using D
Identification sets are empty set.Background devices 300 can send empty set to applying D.
Step S102: before changing equipment 100 receive real network environment in entry request, using first entrance apply and
Entry request described in application execution before changing obtains the first feedback result corresponding with the entry request, sends entry request
With corresponding first feedback result.
The application no longer uses automatized script to execute application test, but live network flow on line is used to be applied
Test.Therefore, the first entrance application in equipment 100 before changing is set in real network environment by the application, so as to first
Entrance application can receive the request (subsequent to be known as entry request) in real network environment.
First entrance application can execute entry request, can be to outside applications transmission during executing entry request
Portion's call request executes external call, can also send intrinsic call request to application before changing and execute intrinsic call.
It, equally can also be outside during the intrinsic call request that the application of application execution first entrance before changing is sent
Portion's application sends external call request and executes external call, can also send intrinsic call request to other applications before changing and execute
Intrinsic call.
After all intrinsic call requests and external call are requested, first entrance application can obtain and entry request
Corresponding first feedback result.
Step S1021: equipment 100 is applied and entry request described in application execution before changing using first entrance before changing
During execute external call in the case where, record the external call sent to applications is requested first request into ginseng and
What applications were sent returns the result, and sends described first and request into ginseng and return the result.
First entrance is applied with the application identities collection for carrying out intrinsic call, and first entrance, which is applied, is executing the process called
In, judge that the purpose application identities in call request whether there is in application identities collection;It is answered if purpose application identities are present in
With in identification sets, it is determined that it is intrinsic call that this, which is called, and otherwise determining that this is called is external call.
First entrance is applied after determining that this is called as external call, is recorded and is asked to the external call that applications are sent
It asks and requests ginseng (distinguishing to enter ginseng with the request of equipment after change, subsequent referred to as first to request into ginseng), and record outside
Using returning the result for transmission.
It is understood that first entrance application can execute multiple external call, executed so first entrance is applied
During entry request, multiple first can be obtained and request into ginseng and corresponding return the result.Then multiple first are sent to ask
It asks into ginseng and corresponding returns the result.
Similarly, application has the application identities collection for carrying out intrinsic call before changing, applies executing the mistake called before changing
Cheng Zhong judges that the purpose application identities in call request whether there is in application identities collection;If purpose application identities are present in
In application identities collection, it is determined that it is intrinsic call that this, which is called, and otherwise determining that this is called is external call.
It is applied after determining that this is called as external call before changing, records the external call request sent to applications
In first request into ginseng, and record returning the result for applications transmission.
It is understood that application can execute multiple external call before changing, first is being executed so applying before changing
During the intrinsic call request that entrance application is sent, multiple first can be obtained and request into ginseng and corresponding return the result.
Then multiple first are sent to request into ginseng and corresponding return the result.
Step S103: after change equipment 200 obtain multiple first request into ginseng and it is corresponding return the result, and be stored in
In storage equipment 400 or it is stored in itself memory space.
In the case where not having relay device between equipment after equipment 100 before changing and change, equipment 200 can after change
Multiple first sent with directly receiving equipment before changing request into ginseng and corresponding return the result.
In the case where having relay device between equipment after equipment 100 before changing and change, equipment 200 can be with before changing
Send multiple first request into ginseng and it is corresponding return the result to relay device, after change equipment 200 again from relay device obtain
Multiple first request into ginseng and corresponding return the result.
In the embodiment shown in Fig. 1 a, equipment 200 can be requested in itself storage multiple first into ginseng and right after change
That answers returns the result, to use in application test process.
In the embodiment shown in Fig. 1 b, equipment 200 can send multiple first and request into ginseng and corresponding return after change
Return result to storage equipment 400, storage equipment 400 in store multiple first request into ginseng and it is corresponding return the result, rear
In continuous application test data can be searched from storage equipment.
Embodiment shown in Fig. 1 b can alleviate the CPU pressure of equipment 200 after change, and equipment 200 is deposited after change
When storage space is smaller, the storage pressure of equipment 200 after change can reduce.
It can request to tie into ginseng and corresponding return using distributed caching structure storage multiple first in storing process
Fruit.Referring to chart 1, storage condition is illustrated:
Table 1
Type | It requests into ginseng | It returns the result |
External call | First requests into ginseng 1 | Return the result 1 |
First requests into ginseng 2 | Return the result 2 | |
…… | …… | |
First requests into ginseng N | Return the result N |
Step S104: equipment 200 obtains first entrance request and corresponding first feedback result after change.
In the case where not having relay device between equipment after equipment 100 before changing and change, equipment 200 can after change
Directly to receive the first entrance request and corresponding first feedback result that equipment is sent before changing.
In the case where having relay device between equipment after equipment 100 before changing and change, equipment 200 can be with before changing
First entrance request and corresponding first feedback result are sent to relay device, equipment 200 is obtained from relay device again after change
First entrance request and corresponding first feedback result.
Step S105: entry request described in application execution after equipment 200 is applied and changed using second entrance after change obtains
Obtain the second feedback result corresponding with the entry request.
Second entrance application can execute entry request, can be to outside applications transmission during executing entry request
Portion's call request executes external call, can also be to executing intrinsic call using sending intrinsic call request after change.
It, equally can also be outside during the intrinsic call request that the application of application execution first entrance is sent after change
Portion's application sends external call request and executes external call, can also be to executing using sending intrinsic call request after other changes
Intrinsic call.
It is understood that since application change occurs after change in equipment, thus intrinsic call process with set before changing
It is standby to will be different.For example, citing according to Fig.3, originally using identical two applications of A difference (using B and applying C) hair
It send intrinsic call to request, only sends intrinsic call request to an application (applying D) now.
Since equipment 100 and equipment 200 after change are still consistent for applications before changing, so before changing
After equipment 100 and change equipment 200 send external call request should be into ginseng it is constant, unlike, send external adjust
It may be changed with the main body of request.
After all intrinsic call requests and external call are requested, second entrance application can obtain and entry request
Corresponding second feedback result.
Step S1051: the entry request described in application execution after applying and changing using second entrance of equipment 200 after change
In the case where executing external call in the process, obtains the external call sent to applications is requested second and request into ginseng,
Multiple first, which request that participation is corresponding, returns the result, and finds and requests to return the result into ginseng is corresponding with described second, and
To external call request feedback, this is returned the result.
Second entrance is applied with the application identities collection for carrying out intrinsic call, and second entrance, which is applied, is executing the process called
In, judge that the purpose application identities in call request whether there is in application identities collection;It is answered if purpose application identities are present in
With in identification sets, it is determined that it is intrinsic call that this, which is called, and otherwise determining that this is called is external call.
Second entrance is applied after determining that this is called as external call, is obtained and is asked to the external call that applications are sent
Second asked is requested into ginseng.Multiple first request that participation is corresponding and return the result shown in the table 1, search and the second request
Enter to join it is corresponding return the result, and return the result returning to external call request using this.
Similarly, it is applied after change using with the application identities collection for carrying out intrinsic call in the mistake for executing calling after change
Cheng Zhong judges that the purpose application identities in call request whether there is in application identities collection;If purpose application identities are present in
In application identities collection, it is determined that it is intrinsic call that this, which is called, and otherwise determining that this is called is external call.
It is applied after change after determining that this is called as external call, obtains the external call request sent to applications
Second request into ginseng.Multiple first request that participation is corresponding and return the result shown in the table 1, search with second request into
Join it is corresponding return the result, and return the result returning to external call request using this.
It should be one since the request for the external call request that equipment 100 is sent with equipment 200 after change before changing enters ginseng
It causes.For example, equipment 100 and equipment 200 after change are executing the entrance for obtaining the order status of order number " 12345 " before changing
In request process, the inquiry request of the order status of order number " 12345 " can be sent to Third Party Logistics System.
Therefore, equipment 100 before changing execute that multiple first generated during external call request should in ginseng
Have and request to request into ginseng into ginseng is consistent with second, that is, equipment 200 can be found in table 1 after changing requests with second into ginseng
Consistent first requests into ginseng, and obtains corresponding return the result.
It requests to return the result feedback external call into ginseng is corresponding with second using finding in the present embodiment, rather than
External call request really is sent to applications as equipment 100 before changing.
The present embodiment avoids equipment 200 after change from really sending external call request to applications, its object is to: by
True external call is occurred to applications in equipment 100 before changing, if equipment 200 is sent out to applications again after change
Raw true external call, may cause many problems.
For example, equipment 100 and equipment 200 after change create the same order to ordering system respectively before changing, then can draw
It plays ordering system and repeated order problem occurs.
For another example, equipment 100 to ordering system searches a wrong order number (1245) before changing, and changes wrong order
Number is that correct order number code (12345) can then look into if equipment 100 also really executes after change because of ordering system
It can not find wrong order number (1245), and send false alarm.
Step S106: equipment 200 compares first feedback result after change and second feedback result is tested
As a result.
Although equipment 200 still can be real after change it is understood that application change occurs for equipment 200 after change
The now business function that equipment is realized before changing.
Therefore, theoretically after change using in correct situation, equipment 200 is executing identical entry request after change
The second obtained feedback result, it should which executing the first feedback result that identical entry request obtains with equipment 100 before changing is
It is consistent.
Therefore, equipment 200 compares the first feedback result and the second feedback result after change, in the first feedback result and second
Under feedback result unanimous circumstances, pass through after determining change using test.Conversely, equipment 200 is in the first feedback result after change
With the second feedback result it is inconsistent in the case where, passes through after determining change using not testing.
Equipment 200 can export and show test result after change, so that user checks test result.
By foregoing description, it can learn that the present embodiment has the following beneficial effects:
The application using the request (i.e. true test case) in real network environment to after change using testing,
So being not necessarily to manual maintenance test case, testing efficiency can be improved;Also, the request in real network environment can cover respectively
Kind application scenarios, so test coverage is higher.
On the basis of above-mentioned application test systems, a kind of application testing method is provided.It is surveyed as shown in figure 4, introducing application
Method for testing embodiment two.
Embodiment two on the basis of embodiment one, increasing step S1022 in step s 102, adjust in inside before changing by equipment
The schedule parameter of intrinsic call progress is indicated with record in the process;Before step S104, device authentication is changed after increasing change
Whether preceding 100 intrinsic call of equipment is finished.
Since the implementation procedure that first entrance is applied and applied before changing in equipment 100 before changing is not synchronized, so,
In order to guarantee that intrinsic call is completely finished by equipment before changing, equipment can verify the inside of equipment 100 before changing after change
Call whether be finished, to prevent equipment before changing also have not been executed time-varying enter test process cause test do not pass through.
Step S1022 is described below and records the realization for indicating the schedule parameter of intrinsic call progress in internal calling process
Process.
According to one embodiment provided by the present application, the first implementation of step S1022 is provided: being asked for intrinsic call
It seeks distribution random number and sends the random number of intrinsic call request, intrinsic call request is sent after executing intrinsic call
Random number.
It is then corresponding, device authentication the first realization that whether 100 intrinsic call of equipment is finished before changing after change
Mode: several random numbers that the equipment before changing is used for intrinsic call are obtained, and several random numbers are executed into exclusive or behaviour
Work obtains exclusive or as a result, if the exclusive or result is zero, enters the application execution after utilizing second entrance application and change
The entry request step.
Referring to Fig. 5 a, before changing equipment 100 execute step S1022 process the following steps are included:
Step S501: equipment 100 is applied and entrance described in application execution before changing described using first entrance before changing
During request, judge whether that intrinsic call occurs.
First entrance is applied after receiving entry request, judges that purpose application identities whether there is in progress intrinsic call
In application identities collection, then it is determined as intrinsic call if it exists.
It is applied after receiving the intrinsic call request that first entrance application is sent before changing, whether judges purpose application identities
It is present in the application identities collection for carrying out intrinsic call, is then determined as intrinsic call if it exists.
Step S502: before changing equipment 100 if it is determined that occur intrinsic call, then be intrinsic call request generate random number,
And send the random number of intrinsic call request.
In order to make it easy to understand, this step is introduced in embodiment according to Fig.3,.
It is then two intrinsic call request distribution using A it is assumed that sending two intrinsic call requests to application B using A
Random number is 0001 and 0010;An intrinsic call request is sent to application C using A, then is intrinsic call request point using A
With random number 0011.
Using B after receiving the two intrinsic calls request sent using A, the random number of two intrinsic call request is recorded
0001 and 0010.Using B in executing intrinsic call request process, Xiang Yingyong C initiates an intrinsic call request, then applies B
Random number 0100 can be generated.
The intrinsic call request record random number 0011 using A transmission is received using C, and is received using the interior of B transmission
Portion's call request simultaneously records random number 0100.
Step S503: equipment 100 sends the random number of intrinsic call request after executing intrinsic call before changing.
After application B executes intrinsic call, transmits and receives using the random number 0001 and 0010 of A and itself generate
To equipment 200 after random number 0100 to the change of application C.
Using C after executing intrinsic call, transmit and receive the random number 0011 using A and receive using B with
Equipment 200 after machine number 0100 to change.
Certainly, intrinsic call request can be also executed other than recording random number using A, using B and application C, and in feedback
Portion's call request is corresponding to be returned the result.It should be in the process mature technology, so not repeating in the present embodiment.
Referring to Fig. 5 b, after change equipment 200 execute verifying process the following steps are included:
Step S511: equipment 200 obtains the equipment before changing and is used for several random numbers of intrinsic call after change, and deposits
Storage is into storage equipment or the memory space of itself.
Equipment 200 directly acquires several random numbers that equipment 100 is sent before changing after change, or obtains from relay device
Several random numbers that equipment 100 generates before changing.In the embodiment shown in Fig. 1 a, several random numbers can be stored in change
Itself memory space of equipment afterwards;In the embodiment shown in Fig. 1 b, several random numbers can be stored in storage equipment.
It is not consistent due to application A, using the time that B and application C execution intrinsic call terminate, it should be earliest using C
It executes and completes intrinsic call, so equipment first receives and stores the random number 0011,0100 sent using C after change.Then,
Receive the random number 0001,0010 and 0100 sent using B.Then, the random number 0001,0010 sent using A is received
With 0011.
Referring to table 2, storage condition is illustrated:
Table 2
Step S512: equipment 200 executes xor operation to several random numbers and obtains exclusive or result after change.
All random numbers that equipment interconnection receives after change carry out xor operation and obtain exclusive or result.
Continue the example above, i.e., it is corresponding using B by the corresponding random number of application C in table 2
Random number execute xor operation with the corresponding random number of application A and obtain exclusive or result.That is,
Step S513: if the exclusive or result is zero, enter the application execution after utilizing second entrance application and change
The step of entry request.
It is zero since the principle of xor operation is after two identical digital exclusive or, similarly, identical two groups of data
Carrying out result when exclusive or is also zero.If missing any one number in one group of data, the exclusive or result of two groups of data all will not be
Zero.
Since application each in equipment before changing can send itself received random number itself generated, (i.e. itself is obtained
All random numbers) to change after equipment, so, theoretically, equipment before changing execute intrinsic call after, set after change
It is standby to obtain several random numbers and be divided into two groups, and, two groups of random numbers are consistent (because the application of distribution random number and receiving random
Several applications can send random number equipment to after changing).
Continue above-described embodiment, two groups of random numbers that equipment obtains after change: one group of random number is 0001,0010,0011
With 0100, another group of random number is also 0001,0010,0011 and 0100.Therefore, the random number that equipment interconnection receives after change into
After row xor operation, xor operation zero.
An application does not complete intrinsic call wherein, then will not send random number equipment, equipment after change to after changing
Just consistent two groups of random numbers can not be formed in obtained several random numbers, so exclusive or result non-zero.
Therefore, equipment 400 determines in equipment before changing in the exclusive or result non-zero for detecting several random numbers after change
Portion calls and is also not finished, then waits for a period of time.If the exclusive or result for detecting several random numbers is zero, determination is set before changing
Standby intrinsic call is over, and is asked into using into described using entrance described in application execution after second entrance application and change
The step of asking.
According to another embodiment provided by the present application, second of implementation of step S1022 is provided: for intrinsic call
Request distribution random number simultaneously sends the exclusive or for the random number that intrinsic call is requested as a result, after executing intrinsic call in transmission
The exclusive or result of the random number of portion's call request.
It is then corresponding, device authentication the first realization that whether 100 intrinsic call of equipment is finished before changing after change
Mode: the exclusive or of several random numbers for intrinsic call of equipment before changing is obtained as a result, and again by several exclusive or results
It executes xor operation and obtains exclusive or as a result, answering if being zero if the exclusive or result into described using second entrance application and after changing
With the execution entry request step.
Referring to Fig. 6 a, before changing equipment 100 execute step S1022 process the following steps are included:
Step S601: during the utilization first entrance is applied with entry request described in application execution before changing,
Judge whether that intrinsic call occurs.
Step S602: if it is determined that intrinsic call occurs, then request to generate random number for intrinsic call and sends intrinsic call
The exclusive or result of the random number of request.
Step S603: the exclusive or result of the random number of intrinsic call request is sent after executing intrinsic call.
Continue the example above, equipment receives and stores the exclusive or using the C random number 0011 and 0100 sent after change
As a result 0111;Receive the exclusive or result 0111 using the B random number 0001,0010 and 0100 sent;It receives and is sent using A
Random number 0001,0010 and 0011 exclusive or result 0000.
Referring to Fig. 6 b, after change equipment 200 execute verifying process the following steps are included:
Step S611: the exclusive or of several random numbers for intrinsic call of equipment before changing is obtained as a result, and storing
Into storage equipment or the memory space of itself.
Referring to table 3, storage condition is illustrated:
Table 3
Step S612: xor operation is executed to several exclusive or results again and obtains exclusive or result.
It is determined by xor operation characteristic, as long as two groups of original data are consistent, no matter the number of xor operation and front and back
Sequentially, finally obtaining an exclusive or result should be zero.Except missing random number in two groups of non-primary data.
Step S613: if the exclusive or result is zero, enter the application execution after utilizing second entrance application and change
The step of entry request.
For the present embodiment embodiment shown in Fig. 5 b, can only be stored in this implementation exclusive or result can rather than
Each random number is stored, so less memory space can be occupied in the present embodiment.
If function described in the present embodiment method is realized in the form of SFU software functional unit and as independent product pin
It sells or in use, can store in a storage medium readable by a compute device.Based on this understanding, the embodiment of the present application
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, this is soft
Part product is stored in a storage medium, including some instructions are used so that calculating equipment (it can be personal computer,
Server, mobile computing device or network equipment etc.) execute all or part of step of each embodiment the method for the application
Suddenly.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), deposits at random
The various media that can store program code such as access to memory (RAM, Random Access Memory), magnetic or disk.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with it is other
The difference of embodiment, same or similar part may refer to each other between each embodiment.
The foregoing description of the disclosed embodiments makes professional and technical personnel in the field can be realized or use the application.
Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the application.Therefore, the application
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (20)
1. a kind of application test systems characterized by comprising
Equipment before changing is applied using first entrance and is applied before changing for receiving the entry request in real network environment
It executes the entry request, obtains the first feedback result corresponding with the entry request, send the entry request and described
First feedback result;
Equipment after change is applied and is changed using second entrance for obtaining the entry request and first feedback result
Entry request described in application execution afterwards obtains the second feedback result corresponding with the entry request, compares first feedback
As a result test result is obtained with second feedback result;
Wherein, the application before changing is applied after the change to execute the one or more application before fractionation or union operation
To execute the one or more application after fractionation or union operation.
2. the system as claimed in claim 1, which is characterized in that
The equipment before changing is also used to applying the process with entry request described in application execution before changing using first entrance
In the case where middle execution intrinsic call, random number is distributed for intrinsic call request and sends the random number of intrinsic call request,
The random number of intrinsic call request is sent after executing intrinsic call;
Equipment after the change is also used to obtain several random numbers that the equipment before changing is used for intrinsic call, and will be described
Several random numbers execute xor operation and obtain exclusive or as a result, if the exclusive or result is zero, utilize second entrance into described
Using and change after entry request step described in application execution.
3. the system as claimed in claim 1, which is characterized in that
The equipment before changing is also used to applying the process with entry request described in application execution before changing using first entrance
In the case where middle execution intrinsic call, for intrinsic call request distribution random number and the different of the random number that intrinsic call is requested is sent
Or as a result, the exclusive or result of the random number of intrinsic call request is sent after executing intrinsic call;
Equipment after the change is also used to obtain the exclusive or knot of several random numbers for intrinsic call of equipment before changing
Fruit, and several exclusive or results are executed into xor operation again and obtain exclusive or as a result, if the exclusive or result is zero, enter the utilization
Entry request step described in application execution after second entrance application and change.
4. the system as claimed in claim 1, which is characterized in that
The equipment before changing is also used to applying the process with entry request described in application execution before changing using first entrance
In the case where middle execution external call, records the external call sent to applications is requested first and request to answer into ginseng and outside
With returning the result for transmission, and sends described first and request into ginseng and return the result;
Equipment after the change, during being also used to the entry request described in application execution after applying and change using second entrance
It in the case where executing external call, obtains the external call sent to applications is requested second and requests into ginseng, multiple the
One, which request that participation is corresponding, returns the result, and finds and requests to return the result into ginseng is corresponding with described second, and to described
External call request is fed back this and is returned the result.
5. the system as claimed in claim 1, which is characterized in that further include:
With the background devices that are connected of equipment after the equipment before changing and change, the first entrance is sent for building and respectively
The application identities collection of intrinsic call, described second are carried out using the application identities collection of progress intrinsic call, the application before changing
Using the application identities collection for carrying out intrinsic call after the application identities collection of entrance application progress intrinsic call and the change;
The first entrance application of the equipment before changing is also used to receive and store the background devices are sent described first and enters
Mouth application carries out the application identities collection of intrinsic call, and during executing the entry request, is based on the first entrance
Using the application identities collection for carrying out intrinsic call, determine that call request is that external call request or intrinsic call are requested;
The application before changing of the equipment before changing is applied described in the background devices transmission before changing for receiving and storing
The application identities collection of intrinsic call is carried out, and during executing the entry request, is carried out based on the application before changing
The application identities collection of intrinsic call determines that call request is that external call request or intrinsic call are requested;
The second entrance application of equipment after the change is also used to receive and store the background devices are sent described second and enters
Mouth application carries out the application identities collection of intrinsic call, and during executing the entry request, is based on the second entrance
Using the application identities collection for carrying out intrinsic call, determine that call request is that external call request or intrinsic call are requested;
It is applied after the change of equipment after the change, for being applied after receiving and storing the change that the background devices are sent
The application identities collection of intrinsic call is carried out, and during executing the entry request, is carried out based on being applied after the change
The application identities collection of intrinsic call determines that call request is that external call request or intrinsic call are requested.
6. system as claimed in claim 4, which is characterized in that further include being asked with first entrance described in equipment after the change
It sums after the change using connected storage equipment;
Equipment is also used to receive and sends multiple first that the equipment before changing is sent to the storage equipment after the change
It requests into ginseng and corresponding returns the result;
The background devices are requested into ginseng and corresponding are returned the result for storing multiple the first of the equipment before changing;
During then equipment is requested that participation is corresponding and returned the result multiple first after the change, find and second request
Enter to join it is corresponding return the result, specifically include: being found from the storage equipment and request to return into ginseng is corresponding with described second
Return result.
7. a kind of application testing method characterized by comprising
It applies in equipment utilization first entrance before changing and the entry request in application execution real network environment and obtains before changing
After obtaining the first feedback result, the entry request is obtained;
Entry request described in application execution after applying and change using second entrance, and obtain corresponding with the entry request the
Two feedback results;
It compares first feedback result and second feedback result and obtains test result;
Wherein, the application before changing is applied after the change to execute the one or more application before fractionation or union operation
To execute the one or more application after fractionation or union operation.
8. the method for claim 7, which is characterized in that in the application execution after utilizing second entrance application and change
Before the entry request, further includes:
Obtain the exclusive or result of several random numbers for intrinsic call of equipment before changing;
Xor operation is executed to several exclusive or results again and obtains exclusive or result;
If the exclusive or result is zero, enter it is described using second entrance apply and change after entry request described in application execution
Step.
9. the method for claim 7, which is characterized in that in the application execution after utilizing second entrance application and change
Before the entry request, further includes:
Obtain several random numbers that the equipment before changing is used for intrinsic call;
Xor operation is executed to several random numbers and obtains exclusive or result;
If the exclusive or result is zero, enter it is described using second entrance apply and change after entry request described in application execution
Step.
10. the method for claim 7, which is characterized in that described to utilize application execution after second entrance application and change
The entry request, comprising:
It is described apply and change using second entrance after entry request described in application execution during, judge whether to occur outer
It calls in portion;
Determine occur external call in the case where, obtain to applications send external call request second request into
Ginseng;
In requesting that participation is corresponding multiple first and return the result, finds and request to tie into the corresponding return of ginseng with described second
Fruit, and this is returned the result to external call request feedback;
Wherein, it the multiple first requests to ask for the equipment before changing in the execution entrance into ginseng and corresponding return the result
It is generated in the case of generation external call during asking.
11. method as claimed in claim 10, which is characterized in that further include receiving and storing the application for becoming and carrying out intrinsic call
Identification sets;
It is then described to judge whether that external call occurs, comprising:
Judge that the purpose application identities of call request whether there is in the application identities collection;
If it does not exist in the application identities collection, it is determined that external call occurs, the call request is external call request.
12. a kind of application testing method characterized by comprising
Receive the entry request in real network environment;
It is applied using first entrance and entry request described in application execution before changing, and obtains corresponding with the entry request the
One feedback result;
The entry request and first feedback result are sent, so that equipment executes the entry request and obtains the after change
Two feedback results compare first feedback result and second feedback result and obtain test result;
Wherein, the application before changing is applied after the change to execute the one or more application before fractionation or union operation
To execute the one or more application after fractionation or union operation.
13. method as claimed in claim 12, which is characterized in that further include:
During the utilization first entrance is applied with entry request described in application execution before changing, judge whether in generation
It calls in portion;
If it is determined that intrinsic call occurs, then request to generate random number for intrinsic call and sends the random number that intrinsic call is requested
Exclusive or result;
The exclusive or result of the random number of intrinsic call request is sent after executing intrinsic call.
14. method as claimed in claim 12, which is characterized in that further include:
During the utilization first entrance is applied with entry request described in application execution before changing, judge whether in generation
It calls in portion;
If it is determined that intrinsic call occurs, then request to generate random number for intrinsic call, and send the random number of intrinsic call request;
The random number of intrinsic call request is sent after executing intrinsic call.
15. method as claimed in claim 13, which is characterized in that described to send intrinsic call after executing intrinsic call
The exclusive or result of the random number of request, comprising:
The first entrance apply for intrinsic call request distribution random number and send comprising random number intrinsic call request to
It is described to apply before changing, after first entrance application obtains first feedback result, send intrinsic call request with
The exclusive or result of machine number;
Application receives requesting comprising random number intrinsic call for the first entrance application transmission before changing, and internal tune is not occurring
In the case where, after executing the interior call request, the exclusive or result of the random number of intrinsic call request is sent;
Application receives requesting comprising random number intrinsic call for the first entrance application transmission before changing, and intrinsic call is occurring
In the case where, for intrinsic call request distribution random number and transmission requests to another to answer before changing comprising the intrinsic call of random number
With the exclusive or result for the random number that transmission intrinsic call is requested after call request in executing.
16. method according to claim 13 or 14, which is characterized in that further include receiving and storing change to carry out intrinsic call
Application identities collection;
It is then described to judge whether that intrinsic call occurs, comprising:
Judge that the purpose application identities of call request whether there is in the application identities collection;
If it exists in the application identities collection, it is determined that intrinsic call occurs, the call request is intrinsic call request.
17. a kind of application testing method characterized by comprising
Receive the entry request in real network environment;
It is applied and entry request described in application execution before changing, acquisition corresponding with the entry request first using first entrance
Feedback result;
Entry request described in application execution, obtains corresponding with the entry request second after applying and change using second entrance
Feedback result;
It compares first feedback result and second feedback result obtains test result;
Wherein, the application before changing is applied after the change to execute the one or more application before fractionation or union operation
To execute the one or more application after fractionation or union operation.
18. method as claimed in claim 17, which is characterized in that further include:
The case where executing intrinsic call during applying using first entrance and entry request described in application execution before changing
Under, random number is distributed for intrinsic call and records the exclusive or of the random number of intrinsic call as a result, after executing intrinsic call
Record the exclusive or result of the random number of intrinsic call;
Several exclusive or results are executed into xor operation again and obtain exclusive or result;
If the exclusive or result is zero, walked into described using entry request described in application execution after second entrance application and change
Suddenly.
19. method as claimed in claim 17, which is characterized in that further include:
The case where executing intrinsic call during applying using first entrance and entry request described in application execution before changing
Under, random number is distributed for intrinsic call and records the random number of intrinsic call, is adjusted inside record after executing intrinsic call
Random number;
Several random numbers are executed into xor operation and obtain exclusive or result;
If the exclusive or result is zero, walked into described using entry request described in application execution after second entrance application and change
Suddenly.
20. method as claimed in claim 17, which is characterized in that further include:
The case where executing external call during applying using first entrance and entry request described in application execution before changing
Under, it records the external call sent to applications is requested first and requests the return knot sent into ginseng and the applications
Fruit;
In the case where executing external call during the entry request described in application execution after applying and change using second entrance,
The external call sent to applications is requested second is obtained to request into ginseng;
In requesting that participation is corresponding multiple first and return the result, finds and request to tie into the corresponding return of ginseng with described second
Fruit;
To external call request feedback, this is returned the result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710929387.2A CN109634832B (en) | 2017-10-09 | 2017-10-09 | Application testing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710929387.2A CN109634832B (en) | 2017-10-09 | 2017-10-09 | Application testing method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109634832A true CN109634832A (en) | 2019-04-16 |
CN109634832B CN109634832B (en) | 2022-04-08 |
Family
ID=66051012
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710929387.2A Active CN109634832B (en) | 2017-10-09 | 2017-10-09 | Application testing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109634832B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101996132A (en) * | 2009-08-14 | 2011-03-30 | 中兴通讯股份有限公司 | Method and device for automatically testing common object request broker architecture (CORBA) interfaces |
US20120331353A1 (en) * | 2005-11-22 | 2012-12-27 | International Business Machines Corporation | Testing a software application interfacing with multiple external software applications in a simulated test environment |
CN103577907A (en) * | 2012-07-24 | 2014-02-12 | 阿里巴巴集团控股有限公司 | Continuous integration testing method and system |
CN103902445A (en) * | 2012-12-27 | 2014-07-02 | 中国移动通信集团吉林有限公司 | Regression test object determination method and device |
CN106708719A (en) * | 2015-08-04 | 2017-05-24 | 阿里巴巴集团控股有限公司 | Business function testing method and apparatus |
-
2017
- 2017-10-09 CN CN201710929387.2A patent/CN109634832B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120331353A1 (en) * | 2005-11-22 | 2012-12-27 | International Business Machines Corporation | Testing a software application interfacing with multiple external software applications in a simulated test environment |
CN101996132A (en) * | 2009-08-14 | 2011-03-30 | 中兴通讯股份有限公司 | Method and device for automatically testing common object request broker architecture (CORBA) interfaces |
CN103577907A (en) * | 2012-07-24 | 2014-02-12 | 阿里巴巴集团控股有限公司 | Continuous integration testing method and system |
CN103902445A (en) * | 2012-12-27 | 2014-07-02 | 中国移动通信集团吉林有限公司 | Regression test object determination method and device |
CN106708719A (en) * | 2015-08-04 | 2017-05-24 | 阿里巴巴集团控股有限公司 | Business function testing method and apparatus |
Non-Patent Citations (1)
Title |
---|
[美]克里斯.戴维斯: "《IT审计 管好信息资产 第2版》", 30 April 2015 * |
Also Published As
Publication number | Publication date |
---|---|
CN109634832B (en) | 2022-04-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108961052A (en) | Verification method, storage method, device, equipment and the medium of block chain data | |
CN106572054B (en) | Distributed lock service implementing method and device in distributed system | |
CN103002415B (en) | A kind of method and apparatus by short message sending identifying code | |
CN106598824A (en) | Performance analysis method and device for block chain | |
US9848089B2 (en) | Methods and apparatus to generate an overall performance index | |
CN106713495B (en) | The method for uploading and access method in IP geographical position, device and access system | |
CN109376172A (en) | Data capture method and system based on block chain | |
CN106549878A (en) | A kind of service shunting method and device | |
CN107347205A (en) | A kind of network section system of selection, apparatus and system | |
CN104408640B (en) | Application software recommends method and device | |
CN107360117B (en) | Data processing method, device and system | |
CN106375458A (en) | Service call system, method and device | |
CN107172177A (en) | A kind of information recommendation method and device | |
CN116097734A (en) | Method for determining business experience model and communication device | |
US9813549B2 (en) | Voice service evaluation processing method and apparatus | |
CN106453349A (en) | An account number login method and apparatus | |
CN109413202A (en) | The ordering system and method for block chain Transaction Information | |
CN104239423B (en) | A kind of relationship among persons are apart from acquisition methods and system | |
CN108112051A (en) | A kind of method and apparatus for the access information that wireless access point is provided | |
CN106874289B (en) | Associated node determination method and equipment | |
CN110288390A (en) | Determine the method and device of address | |
CN106446050A (en) | Method and system for subscription by aiming at changed data of database | |
CN105681266B (en) | A kind of communication cluster method and device of mediaphone MMTel | |
CN105979567B (en) | Determine method and apparatus, the system of the access information of WAP | |
CN108647315A (en) | Collecting method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |