CN112749078A - Buried point testing method and device - Google Patents

Buried point testing method and device Download PDF

Info

Publication number
CN112749078A
CN112749078A CN201911052577.6A CN201911052577A CN112749078A CN 112749078 A CN112749078 A CN 112749078A CN 201911052577 A CN201911052577 A CN 201911052577A CN 112749078 A CN112749078 A CN 112749078A
Authority
CN
China
Prior art keywords
buried point
point data
domain name
data packet
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911052577.6A
Other languages
Chinese (zh)
Other versions
CN112749078B (en
Inventor
刘宁
高楚云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Wodong Tianjun Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Wodong Tianjun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Wodong Tianjun Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201911052577.6A priority Critical patent/CN112749078B/en
Publication of CN112749078A publication Critical patent/CN112749078A/en
Application granted granted Critical
Publication of CN112749078B publication Critical patent/CN112749078B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3692Test management for test results analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24564Applying rules; Deductive queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a buried point testing method and device, and relates to the technical field of computers. One embodiment of the method comprises: monitoring the domain name of a network data packet transmitted by a packet capturing tool; copying the buried point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program; and detecting the buried point data based on a dynamic rule base, and generating a test report. The implementation mode can solve the technical problems of low testing efficiency and high missing testing rate.

Description

Buried point testing method and device
Technical Field
The invention relates to the technical field of computers, in particular to a buried point testing method and device.
Background
With the rapid development of the internet and information technology, various application programs are widely used in the work and life of people. In order to investigate whether a function satisfies a user's desire, buried data is generally set in advance in an application program. If the user triggers the function module with the preset embedded point in the process of using the application program, the application program can send the corresponding embedded point data to the online server. By processing the buried point data and further analyzing, whether the functions of the application program are widely used by the user can be inferred, and the application program can be adjusted or improved according to the analysis result of the buried point data, so that the user requirements can be better met, and the user experience is improved.
In order to ensure the correctness of the analysis result of the buried point data, a tester needs to test the buried point data before the application program is released.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art:
after a network data packet is intercepted and captured by a packet capturing tool, testers need to extract buried point data and then compare the buried point data with buried point data requirement documents one by one, time and labor are consumed, testing efficiency is low, errors are prone to occurring, and the missing testing rate is high.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method and an apparatus for testing a buried point, so as to solve the technical problems of low testing efficiency and high missing rate.
To achieve the above object, according to an aspect of an embodiment of the present invention, there is provided a buried point testing method including:
monitoring the domain name of a network data packet transmitted by a packet capturing tool;
copying the buried point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program;
and detecting the buried point data based on a dynamic rule base and generating a test report.
Optionally, copying the buried point data in the network data packet according to the correspondence between the domain name of the network data packet and the domain name reported by the application program buried point data, including:
judging whether the domain name of the network data packet is consistent with the domain name reported by the application program buried point data;
and if so, copying the data of the buried points in the network data packet.
Optionally, the dynamic rule base comprises general rules and/or custom rules;
before detecting the buried point data based on a dynamic rule base and generating a test report, the method further comprises the following steps:
abstracting a field of buried point data in a requirement document into a universal rule; and/or the presence of a gas in the gas,
and generating a custom rule for the field of the buried point data in the requirement document by adopting a regular expression.
Optionally, the detecting the buried point data based on a dynamic rule base includes:
if the buried point data conforms to the general rule or the user-defined rule, the detection result is a pass;
and if the buried point data does not accord with the general rule and the user-defined rule, the detection result is failure.
In addition, according to another aspect of an embodiment of the present invention, there is provided a buried point testing apparatus including:
the monitoring module is used for monitoring the domain name of the network data packet transmitted by the packet capturing tool;
the copying module is used for copying the buried point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program;
and the test module is used for detecting the buried point data based on the dynamic rule base and generating a test report.
Optionally, the copy module is further configured to:
judging whether the domain name of the network data packet is consistent with the domain name reported by the application program buried point data;
and if so, copying the data of the buried points in the network data packet.
Optionally, the dynamic rule base comprises general rules and/or custom rules;
the test module is further configured to:
abstracting a field of buried point data in a requirement document into a universal rule before detecting the buried point data based on a dynamic rule base and generating a test report; and/or the presence of a gas in the gas,
and generating a custom rule for the field of the buried point data in the requirement document by adopting a regular expression.
Optionally, the test module is further configured to:
if the buried point data conforms to the general rule or the user-defined rule, the detection result is a pass;
and if the buried point data does not accord with the general rule and the user-defined rule, the detection result is failure.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, including:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any of the embodiments described above.
According to another aspect of the embodiments of the present invention, there is also provided a computer readable medium, on which a computer program is stored, which when executed by a processor implements the method of any of the above embodiments.
One embodiment of the above invention has the following advantages or benefits: by adopting the technical means of copying the buried point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program, the buried point data is detected based on the dynamic rule base, and the technical problems of low testing efficiency and high missing detection rate in the prior art are solved. According to the embodiment of the invention, the buried point data in the network data packet is copied according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program, so that the operation of additionally screening the network data packet is reduced, and the buried point data of the application program can be automatically collected; and moreover, the data of the buried points are automatically detected according to the dynamic rule base, so that the labor can be saved, the accuracy of the buried point test is improved, and the missing test is effectively avoided.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
FIG. 1 is a schematic diagram of a main flow of a buried point testing method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of filtering out domain name consistent network packets according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of demand document buried point data according to an embodiment of the invention;
FIG. 4 is a schematic diagram of a general rule according to an embodiment of the invention;
FIG. 5 is a diagram of a custom rule according to an embodiment of the present invention;
FIG. 6 is a diagram illustrating the results of a test based on a general rule according to an embodiment of the present invention;
FIG. 7 is a diagram illustrating the detection results based on the customized rule according to an embodiment of the present invention;
FIG. 8 is a schematic view showing a main flow of a buried site testing method according to a reference example of the present invention;
FIG. 9 is a schematic view of a main flow of a buried site testing method according to another referential embodiment of the present invention;
FIG. 10 is a schematic diagram of the main modules of a buried site testing apparatus according to an embodiment of the present invention;
FIG. 11 is an exemplary system architecture diagram in which embodiments of the present invention may be employed;
fig. 12 is a schematic structural diagram of a computer system suitable for implementing a terminal device or a server according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
In the prior art, after a network data packet is intercepted by a packet capturing tool, testers need to extract buried point data, and then compare the buried point data with buried point data requirement documents one by one, so that the time and the labor are consumed, and errors are easy to occur; particularly, when the number of buried points is large, a tester needs to frequently extract the buried point data through a packet capturing tool, so that the number of steps is large, the cost is high, and the testing efficiency is low; and moreover, the buried point data is compared and verified manually, so that errors are easy to occur and the missing detection rate is high.
In order to solve the technical problems in the prior art, the embodiment of the invention copies the buried point data in the network data packet according to the corresponding relationship between the domain name of the network data packet and the domain name reported by the buried point data of the application program, reduces the operation of additionally screening the network data packet, and can automatically collect the buried point data of the application program, thereby improving the testing efficiency and reducing the missing rate.
Fig. 1 is a schematic view of a main flow of a buried point testing method according to an embodiment of the present invention. As an embodiment of the present invention, as shown in fig. 1, the buried point testing method may include:
step 101, monitoring the domain name of the network data packet transmitted by the packet capturing tool.
When a tester connects the packet capturing tool with the application program and triggers the application program, the packet capturing tool transmits the network data packet to the online server, and monitors and controls the domain name of the network data packet. Alternatively, the bale plucking tool may be Fiddler or Whistle, etc. Wherein Fiddler is an Http protocol debugging agent tool which can record and check Http communication between a computer and the Internet; whistle is an Http protocol debugging agent that is capable of recording and examining Http communications between a computer and the internet.
And 102, copying the buried point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program.
In the embodiment of the present invention, the correspondence between the domain name of the network data packet and the domain name reported by the buried point data of the application program may be configured in advance. The corresponding relationship between at least one domain name and the domain name reported by the application program buried point data can be configured, for example, if the domain name reported by the application program buried point data is domain name a, the corresponding relationship between domain name a and the domain name a, the domain name B and the domain name C can be configured in advance, and when any one of the domain name a, the domain name B and the domain name C of the network data packet transmitted by the packet capturing tool is transmitted, the buried point data in the network data packet needs to be copied, so that the buried point data corresponding to the three domain names can be detected and analyzed one by one. For another example, if the domain name reported by the application program buried point data is domain name a, the corresponding relationship between domain name a and domain name a or domain name B may be configured in advance, and accordingly, the packet capturing tool copies the buried point data corresponding to domain name a or domain name B, which is not described in detail.
Optionally, step 102 comprises: judging whether the domain name of the network data packet is consistent with the domain name reported by the application program buried point data; and if so, copying the data of the buried points in the network data packet. Optionally, if the domain name of the network data packet is not consistent with the domain name reported by the embedded data of the application program, the network data packet is not additionally processed, and the original operation of a packet capturing tool (such as Fiddler or Whistle) itself is continued. It should be noted that, in the embodiment of the present invention, the domain name reported by the application program embedded point data is the domain name of the online server, the application program reports the embedded point data to the online server, and when the domain names are consistent, the embodiment of the present invention copies the embedded point data in the network data packet, and sends the embedded point data to the test server.
The packet capture tool (e.g., Fiddler or Whistle) records all communication information from the application program to the internet, including some domain names reported by non-buried point data, as shown in fig. 2, the domain names api.m.jd.com, img11.360buying.com, etc. are all domain names reported by non-buried point data, but are all recorded in the packet capture tool. Therefore, in the embodiment of the present invention, the network data packets are filtered through the domain name, and the network data packets consistent with the domain name reported by the buried point data are screened out, such as the reported domain name of the buried point data: com. Alternatively, as shown in fig. 2, the buried point data may include: apv, bld, page _ id, ela, eid, etc.
And 103, detecting the buried point data based on a dynamic rule base and generating a test report.
And after the buried point data is obtained, automatically detecting the buried point data according to a dynamic rule base, and generating a test report. Wherein the dynamic rule base comprises general rules and/or custom rules.
As shown in FIG. 3, the fields of the buried point data in the requirements document may include several fields, such as apv, bld, page _ id, ela, eid, etc. Optionally, the implementation method of the general rule is specifically as follows: fields of the buried point data in the requirements document are abstracted into general rules. For example: type of buried point data (click, page view amount, exposure); whether a field of the buried point data is empty; and generating a corresponding general rule according to the field of the buried point data in the requirement document, such as the splicing number of the buried point data field, and the like, as shown in fig. 4. Because the universal rule has universality and wide applicability, only one part is needed to be generated, the universal rule can be repeatedly used, and the realization cost is lower.
Optionally, the implementation method of the custom rule is specifically as follows: buried point data in the requirements document, as shown in FIG. 5. When the actually reported buried point data has difference due to different scenes of triggering application programs, a regular expression is needed to be adopted for the field of the buried point data to generate a self-defined rule. The user-defined rule is realized aiming at a specific buried point data, so that the personalized requirement is met.
When the buried point data amount is large, a universal rule is preferentially generated and used, and only when the format of the buried point data has uncertainty, a custom rule is generated by using a regular expression. Therefore, the dynamic rule base saves the cost and has the characteristics of flexibility and diversity. In the embodiment of the present invention, a general rule may be generated, or a custom rule may be generated, and the dynamic rule base may include the general rule, the custom rule, or both the general rule and the custom rule.
Optionally, the detecting the buried point data based on a dynamic rule base includes: if the buried point data conforms to the general rule or the user-defined rule, the detection result is a pass; if the buried point data does not conform to the general rule and the custom rule, the detection result is failure, as shown in fig. 6-7.
According to the various embodiments, it can be seen that the technical means for detecting the buried point data based on the dynamic rule base solves the technical problems of low test efficiency and high missing rate in the prior art by copying the buried point data in the network data packet according to the corresponding relationship between the domain name of the network data packet and the domain name reported by the buried point data of the application program. According to the embodiment of the invention, the buried point data in the network data packet is copied according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program, so that the operation of additionally screening the network data packet is reduced, and the buried point data of the application program can be automatically collected; and moreover, the data of the buried points are automatically detected according to the dynamic rule base, so that the labor can be saved, the accuracy of the buried point test is improved, and the missing test is effectively avoided.
Fig. 8 is a schematic view of a main flow of a buried point testing method according to a referential embodiment of the present invention. The embedded point testing method provided by the embodiment of the invention is mainly realized by the following steps:
installing a custom plug-in a bag-grabbing tool (Fiddler or Whistle and the like);
a tester connects a terminal (such as a mobile phone, a tablet personal computer and the like) with a packet capturing tool, and then triggers an application program to report a network data packet to an online server;
the user-defined plug-in monitors a domain name of a network data packet transmitted by a packet capturing tool, copies buried point data in the network data packet and sends the buried point data to a test server if the domain name of the network data packet is consistent with the domain name reported by the buried point data of an application program;
and the test server receives the buried point data, detects the buried point data according to the dynamic rule base and generates a test report.
In the embodiment of the invention, by installing the custom plug-in the bale plucking tool, when a tester connects the bale plucking tool with the application program and triggers the application program, the data of the buried point can be automatically collected and reported to the test server. The test server comprises a dynamic rule base (including a universal rule and a self-defined rule), so that whether the buried point data is correct or not can be automatically detected according to the dynamic rule base, and a test report is generated.
It should be pointed out that the user-defined plug-in only needs to be developed and realized by one part, can be repeatedly used, does not need additional operation by a tester, has low learning cost and is beneficial to popularization and use; the user-defined plug-in automatically monitors the data of the buried points and sends the data to the test server, secondary transformation on the application to be tested is not needed, and the purpose of automatically collecting the data of the buried points is achieved.
The embedded point testing method provided by the embodiment of the invention can automatically collect the embedded point data of the application program by using the user-defined plug-in and the seamless connection bale catching tool, reduces the steps of acquiring the embedded point data and saves the testing time; meanwhile, the test server generates a dynamic rule base according to the buried point data requirement document, and automatically and rapidly performs consistency detection on the buried point data reported by the application program in real time, so that the labor cost for verifying the buried point is reduced, and the accuracy of the buried point test is improved.
Fig. 9 is a schematic view of a main flow of a buried point testing method according to another referential embodiment of the present invention.
Step 901, creating a dynamic rule base, specifically: abstracting a field of buried point data in a requirement document into a universal rule; and/or generating a custom rule for the field of the buried point data in the requirement document by adopting a regular expression.
And step 902, monitoring the domain name of the network data packet transmitted by the packet capturing tool.
Step 903, judging whether the domain name of the network data packet is consistent with the domain name reported by the application program buried point data; if yes, go to step 904; if not, the process is ended.
And 904, copying the buried point data in the network data packet.
Step 905, detecting the buried point data based on a dynamic rule base.
Step 906, a test report is generated.
According to the various embodiments, the technical means for detecting the buried point data based on the dynamic rule base is realized by copying the buried point data in the network data packet according to the domain name of the network data packet and the domain name reported by the buried point data of the application program, so that the technical problems of low test efficiency and high missing test rate in the prior art are solved. According to the embodiment of the invention, the buried point data in the network data packet is copied according to the domain name of the network data packet and the domain name reported by the buried point data of the application program, so that the operation of additionally screening the network data packet is reduced, and the buried point data of the application program can be automatically collected; and moreover, the data of the buried points are automatically detected according to the dynamic rule base, so that the labor can be saved, the accuracy of the buried point test is improved, and the missing test is effectively avoided.
Fig. 10 is a schematic diagram of main modules of a buried point testing device according to an embodiment of the present invention, and as shown in fig. 10, the buried point testing device 1000 includes a monitoring module 1001, a copying module 1002, and a testing module 1003. The monitoring module 1001 is configured to monitor a domain name of a network data packet transmitted by the packet capturing tool; the copying module 1002 is configured to copy the buried point data in the network data packet according to a correspondence between the domain name of the network data packet and the domain name reported by the application program buried point data; the test module 1003 is configured to detect the buried point data based on a dynamic rule base and generate a test report.
Optionally, the copy module 1002 is further configured to:
judging whether the domain name of the network data packet is consistent with the domain name reported by the application program buried point data;
and if so, copying the data of the buried points in the network data packet.
Optionally, the dynamic rule base comprises general rules and/or custom rules;
the test module is further configured to:
abstracting a field of buried point data in a requirement document into a universal rule before detecting the buried point data based on a dynamic rule base and generating a test report; and/or the presence of a gas in the gas,
and generating a custom rule for the field of the buried point data in the requirement document by adopting a regular expression.
Optionally, the test module 1003 is further configured to:
if the buried point data conforms to the general rule or the user-defined rule, the detection result is a pass;
and if the buried point data does not accord with the general rule and the user-defined rule, the detection result is failure.
According to the various embodiments, it can be seen that the technical means for detecting the buried point data based on the dynamic rule base solves the technical problems of low test efficiency and high missing rate in the prior art by copying the buried point data in the network data packet according to the corresponding relationship between the domain name of the network data packet and the domain name reported by the buried point data of the application program. According to the embodiment of the invention, the buried point data in the network data packet is copied according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program, so that the operation of additionally screening the network data packet is reduced, and the buried point data of the application program can be automatically collected; and moreover, the data of the buried points are automatically detected according to the dynamic rule base, so that the labor can be saved, the accuracy of the buried point test is improved, and the missing test is effectively avoided.
It should be noted that, in the embodiment of the buried point testing apparatus of the present invention, the detailed description has been given in the above-mentioned buried point testing method, and therefore, the repeated description is not repeated here.
Fig. 11 illustrates an exemplary system architecture 1100 to which the method or apparatus for buried point testing of embodiments of the present invention may be applied.
As shown in fig. 11, the system architecture 1100 may include terminal devices 1101, 1102, 1103, a network 1104, and a server 1105. The network 1104 is a medium to provide communication links between the terminal devices 1101, 1102, 1103 and the server 1105. Network 1104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
A user may use terminal devices 1101, 1102, 1103 to interact with a server 1104 over a network 1104 to receive or send messages or the like. Various messaging client applications, such as shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, social platform software, etc. (examples only) may be installed on the terminal devices 1101, 1102, 1103.
The terminal devices 1101, 1102, 1103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 1105 may be a server that provides various services, such as a backend management server (for example only) that provides support for shopping-like websites browsed by users using the terminal devices 1101, 1102, 1103. The background management server may analyze and otherwise process the received data such as the item information query request, and feed back a processing result (for example, target push information, item information — just an example) to the terminal device.
It should be noted that the embedded point testing method provided by the embodiment of the present invention is generally executed by the server 1105, and accordingly, the embedded point testing apparatus is generally disposed in the server 1105. The embedded point testing method provided by the embodiment of the present invention may also be executed by the terminal devices 1101, 1102, and 1103, and accordingly, the embedded point testing apparatus may be disposed in the terminal devices 1101, 1102, and 1103.
It should be understood that the number of terminal devices, networks, and servers in fig. 11 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 12, shown is a block diagram of a computer system 1200 suitable for use with a terminal device implementing an embodiment of the present invention. The terminal device shown in fig. 12 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiment of the present invention.
As shown in fig. 12, the computer system 1200 includes a Central Processing Unit (CPU)1201, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)1202 or a program loaded from a storage section 1208 into a Random Access Memory (RAM) 1203. In the RAM1203, various programs and data necessary for the operation of the system 1200 are also stored. The CPU 1201, ROM 1202, and RAM1203 are connected to each other by a bus 1204. An input/output (I/O) interface 1205 is also connected to bus 1204.
The following components are connected to the I/O interface 1205: an input section 1206 including a keyboard, a mouse, and the like; an output portion 1207 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 1208 including a hard disk and the like; and a communication section 1209 including a network interface card such as a LAN card, a modem, or the like. The communication section 1209 performs communication processing via a network such as the internet. A driver 1210 is also connected to the I/O interface 1205 as needed. A removable medium 1211, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is mounted on the drive 1210 as necessary, so that a computer program read out therefrom is mounted into the storage section 1208 as necessary.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 1209, and/or installed from the removable medium 1211. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 1201.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer programs according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present invention may be implemented by software or hardware. The described modules may also be provided in a processor, which may be described as: a processor includes a monitoring module, a copy module, and a test module, where the names of the modules do not in some cases constitute a limitation on the modules themselves.
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to comprise: monitoring the domain name of a network data packet transmitted by a packet capturing tool; copying the buried point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program; and detecting the buried point data based on a dynamic rule base and generating a test report.
According to the technical scheme of the embodiment of the invention, the embedded point data in the network data packet is copied according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program, so that the embedded point data is detected based on the dynamic rule base, and the technical problems of low test efficiency and high missing rate in the prior art are solved. According to the embodiment of the invention, the buried point data in the network data packet is copied according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program, so that the operation of additionally screening the network data packet is reduced, and the buried point data of the application program can be automatically collected; and moreover, the data of the buried points are automatically detected according to the dynamic rule base, so that the labor can be saved, the accuracy of the buried point test is improved, and the missing test is effectively avoided.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method of buried point testing, comprising:
monitoring the domain name of a network data packet transmitted by a packet capturing tool;
copying the buried point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program;
and detecting the buried point data based on a dynamic rule base and generating a test report.
2. The method of claim 1, wherein copying the embedded data in the network packet according to the correspondence between the domain name of the network packet and the domain name reported by the embedded data of the application program comprises:
judging whether the domain name of the network data packet is consistent with the domain name reported by the application program buried point data;
and if so, copying the data of the buried points in the network data packet.
3. The method of claim 1, wherein the dynamic rule base comprises general rules and/or custom rules;
before detecting the buried point data based on a dynamic rule base and generating a test report, the method further comprises the following steps:
abstracting a field of buried point data in a requirement document into a universal rule; and/or the presence of a gas in the gas,
and generating a custom rule for the field of the buried point data in the requirement document by adopting a regular expression.
4. The method of claim 3, wherein detecting the buried point data based on a dynamic rule base comprises:
if the buried point data conforms to the general rule or the user-defined rule, the detection result is a pass;
and if the buried point data does not accord with the general rule and the user-defined rule, the detection result is failure.
5. A buried point testing device, comprising:
the monitoring module is used for monitoring the domain name of the network data packet transmitted by the packet capturing tool;
the copying module is used for copying the buried point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program;
and the test module is used for detecting the buried point data based on the dynamic rule base and generating a test report.
6. The apparatus of claim 1, wherein the copy module is further configured to:
judging whether the domain name of the network data packet is consistent with the domain name reported by the application program buried point data;
and if so, copying the data of the buried points in the network data packet.
7. The apparatus of claim 1, wherein the dynamic rule base comprises generic rules and/or custom rules;
the test module is further configured to:
prior to detecting the buried point data based on a dynamic rule base and generating a test report,
abstracting a field of buried point data in a requirement document into a universal rule; and/or the presence of a gas in the gas,
and generating a custom rule for the field of the buried point data in the requirement document by adopting a regular expression.
8. The apparatus of claim 7, wherein the testing module is further configured to:
if the buried point data conforms to the general rule or the user-defined rule, the detection result is a pass;
and if the buried point data does not accord with the general rule and the user-defined rule, the detection result is failure.
9. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-4.
10. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-4.
CN201911052577.6A 2019-10-31 2019-10-31 Buried point testing method and device Active CN112749078B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911052577.6A CN112749078B (en) 2019-10-31 2019-10-31 Buried point testing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911052577.6A CN112749078B (en) 2019-10-31 2019-10-31 Buried point testing method and device

Publications (2)

Publication Number Publication Date
CN112749078A true CN112749078A (en) 2021-05-04
CN112749078B CN112749078B (en) 2024-06-18

Family

ID=75644580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911052577.6A Active CN112749078B (en) 2019-10-31 2019-10-31 Buried point testing method and device

Country Status (1)

Country Link
CN (1) CN112749078B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915296A (en) * 2015-06-29 2015-09-16 北京金山安全软件有限公司 Buried point testing method, data query method and device
CN106528432A (en) * 2016-12-12 2017-03-22 北京三快在线科技有限公司 Construction method and apparatus for test scene data, and buried point test method
WO2017084508A1 (en) * 2015-11-17 2017-05-26 阿里巴巴集团控股有限公司 Method and device for automatically burying points
CN107832210A (en) * 2017-10-27 2018-03-23 广州四三九九信息科技有限公司 Access method of testing, device and a server are buried in daily record
CN107870860A (en) * 2017-05-05 2018-04-03 平安科技(深圳)有限公司 Bury a checking system and method
CN107992506A (en) * 2016-10-27 2018-05-04 北京京东尚科信息技术有限公司 Information processing method and device
CN108319552A (en) * 2018-02-07 2018-07-24 优信数享(北京)信息技术有限公司 One kind burying a test method, apparatus and system
US10216621B1 (en) * 2017-11-16 2019-02-26 Servicenow, Inc. Automated diagnostic testing of databases and configurations for performance analytics visualization software
WO2019100614A1 (en) * 2017-11-22 2019-05-31 平安科技(深圳)有限公司 Buried point data processing method, device, computer device and storage medium
CN109840157A (en) * 2017-11-28 2019-06-04 中国移动通信集团浙江有限公司 Method, apparatus, electronic equipment and the storage medium of fault diagnosis
CN109960651A (en) * 2019-02-13 2019-07-02 北京达佳互联信息技术有限公司 Bury a test method, system, device and computer readable storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915296A (en) * 2015-06-29 2015-09-16 北京金山安全软件有限公司 Buried point testing method, data query method and device
WO2017084508A1 (en) * 2015-11-17 2017-05-26 阿里巴巴集团控股有限公司 Method and device for automatically burying points
CN107992506A (en) * 2016-10-27 2018-05-04 北京京东尚科信息技术有限公司 Information processing method and device
CN106528432A (en) * 2016-12-12 2017-03-22 北京三快在线科技有限公司 Construction method and apparatus for test scene data, and buried point test method
CN107870860A (en) * 2017-05-05 2018-04-03 平安科技(深圳)有限公司 Bury a checking system and method
CN107832210A (en) * 2017-10-27 2018-03-23 广州四三九九信息科技有限公司 Access method of testing, device and a server are buried in daily record
US10216621B1 (en) * 2017-11-16 2019-02-26 Servicenow, Inc. Automated diagnostic testing of databases and configurations for performance analytics visualization software
WO2019100614A1 (en) * 2017-11-22 2019-05-31 平安科技(深圳)有限公司 Buried point data processing method, device, computer device and storage medium
CN109840157A (en) * 2017-11-28 2019-06-04 中国移动通信集团浙江有限公司 Method, apparatus, electronic equipment and the storage medium of fault diagnosis
CN108319552A (en) * 2018-02-07 2018-07-24 优信数享(北京)信息技术有限公司 One kind burying a test method, apparatus and system
CN109960651A (en) * 2019-02-13 2019-07-02 北京达佳互联信息技术有限公司 Bury a test method, system, device and computer readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
于学军;肖然;: "基于行为声明的可信性测试方法与可信度计算研究", 计算机系统应用, no. 11 *
王苗苗;钱步仁;许莹莹;王雪凤;: "基于通用规则的SQL注入攻击检测与防御系统的研究", 电子设计工程, no. 05, 5 March 2017 (2017-03-05) *

Also Published As

Publication number Publication date
CN112749078B (en) 2024-06-18

Similar Documents

Publication Publication Date Title
CN107644075B (en) Method and device for collecting page information
CN110798445B (en) Public gateway interface testing method and device, computer equipment and storage medium
CN110858172A (en) Automatic test code generation method and device
CN111563015B (en) Data monitoring method and device, computer readable medium and terminal equipment
CN110737726B (en) Method and device for determining test data of interface to be tested
CN110928934A (en) Data processing method and device for business analysis
US10775751B2 (en) Automatic generation of regular expression based on log line data
CN109218041B (en) Request processing method and device for server system
CN107368407B (en) Information processing method and device
CN109522202B (en) Software testing method and device
CN109214189B (en) Method, device, storage medium and electronic equipment for identifying program bugs
CN115022201B (en) Data processing function test method, device, equipment and storage medium
KR101392624B1 (en) Mobile forensics method based on network communication
CN107342917B (en) Method and apparatus for detecting network device performance
CN112749078B (en) Buried point testing method and device
CN109756393B (en) Information processing method, system, medium, and computing device
CN112988560A (en) Method and device for testing system robustness
US9858549B2 (en) Business transaction resource usage tracking
CN112035205A (en) Data processing method, device, equipment and storage medium
CN112532734A (en) Message sensitive information detection method and device
CN113626301A (en) Method and device for generating test script
CN111651356A (en) Application program testing method, device and system
CN113254325A (en) Test case processing method and device
CN112445697A (en) Method and apparatus for testing applications
CN111767486A (en) Method, device, electronic equipment and computer readable medium for displaying page

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant