CN113535568A - Verification method, device, equipment and medium for application deployment version - Google Patents
Verification method, device, equipment and medium for application deployment version Download PDFInfo
- Publication number
- CN113535568A CN113535568A CN202110829823.5A CN202110829823A CN113535568A CN 113535568 A CN113535568 A CN 113535568A CN 202110829823 A CN202110829823 A CN 202110829823A CN 113535568 A CN113535568 A CN 113535568A
- Authority
- CN
- China
- Prior art keywords
- verification
- application
- program
- interface
- version
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The disclosure provides a verification method of an application deployment version, relates to the technical field of computers, and can be applied to the technical field of finance. The verification method of the application deployment version comprises the following steps: deploying the application deployment version to form a target application; running a verification program, wherein the verification program comprises a first interface, a second interface and a third interface; receiving an input validation rule through a first interface; calling the main function program through a second interface to acquire data of the target application; verifying the data of the target application by the main function program according to the verification rule to obtain a verification result; and outputting the verification result through the third interface. The disclosure also provides a verification device, equipment and medium for the application deployment version. The verification method of the application deployment version can improve verification efficiency.
Description
Technical Field
The disclosure relates to the technical field of computers, in particular to a verification method, a verification device, verification equipment and verification media for application deployment versions, and can be applied to the technical field of finance.
Background
With the development of information digitization technology and the increase of the service user quantity, the coverage function of the existing application system can not meet the user requirements, so a great deal of product requirements are brought forward, and for research and development, testing and version release, in the face of large-quantity and frequent-cycle application deployment and release, currently, effective tools and methods for verifying relevant application versions after deployment do not exist, verification can only be performed through manual verification, and the verification efficiency is low.
Disclosure of Invention
In view of the foregoing, the present disclosure provides a verification method, apparatus, device, and medium for an application deployment version that improve verification efficiency.
According to a first aspect of the present disclosure, there is provided a verification method of an application deployment version, including: deploying the application deployment version to form a target application; running a verification program, wherein the verification program comprises a first interface, a second interface and a third interface; receiving an input validation rule through a first interface; calling the main function program through a second interface to acquire data of the target application; verifying the data of the target application by the main function program according to the verification rule to obtain a verification result; and outputting the verification result through the third interface.
According to the embodiment of the disclosure, the method for verifying the application deployment version further comprises the following steps: deploying a web container on an application server of a target application; the authentication program is deployed on the web container.
According to an embodiment of the present disclosure, calling the main function program through the second interface to acquire the data of the target application includes: accessing a website of the target application; reading a webpage source code of a target application; cleaning the webpage source codes according to the verification rule; analyzing a webpage source code of a target application; and acquiring the analyzed related webpage data of the target application, wherein the related webpage data correspond to the verification rule.
According to an embodiment of the present disclosure, verifying, by the main function program, data of the target application according to the verification rule to obtain a verification result specifically includes: searching a corresponding verification module in a verification library according to a verification rule, wherein the verification module is associated with the data of the target application; and judging whether the target application meets the verification rule or not according to the return state code of the verification module.
According to an embodiment of the present disclosure, at least one of the steps of running the validation program, inputting the validation rules, and outputting the validation results is performed by a web console.
According to an embodiment of the present disclosure, the application deployment version includes a new addition version and/or a defect repair version.
According to an embodiment of the present disclosure, the verification program is a web program and the main function program is a Python program.
A second aspect of the present disclosure provides an apparatus for verifying an application deployment version, including:
the application version deployment module is used for deploying the application version to form a target application;
the verification program running module is used for running a verification program, wherein the verification program comprises a first interface, a second interface and a third interface;
the verification rule receiving module is used for receiving an input verification rule through the first interface;
the main function program calling module is used for calling a main function program through the second interface so as to acquire the data of the target application;
the verification module is used for verifying the data of the target application by a main function program according to the verification rule so as to obtain a verification result; and
and the verification result output module is used for outputting the verification result through the third interface.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method for verifying the deployment version of the application as described above.
A fourth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the method of verifying the deployment version of the application described above.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following description of embodiments of the disclosure, which proceeds with reference to the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario diagram of a verification method, apparatus, device and medium for an application deployment version according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of a method of verification of an application deployment version in accordance with an embodiment of the disclosure;
FIG. 3 schematically illustrates a flow diagram of another method of verification of an application deployment version in accordance with an embodiment of the disclosure;
fig. 4 schematically shows a flowchart of operation S204 for calling the main function program through the second interface to acquire data of the target application;
fig. 5 schematically shows a flowchart of the operation S205 of verifying data of the target application by the main function program according to the verification rule to obtain a verification result;
fig. 6 schematically shows a block diagram of an authentication apparatus of an application deployment version according to an embodiment of the present disclosure; and
fig. 7 schematically shows a block diagram of an electronic device adapted to implement a verification method of an application deployment version according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
With the development of information digitization technology and the increase of the service user quantity, the existing application system coverage function can not meet the user requirements, so a great deal of product requirements are brought up, and in the process of realizing the corresponding application function, the processes of research and development, version release, version deployment, verification and the like are required. Specifically, research and development personnel write codes according to requirements to form a new application version, and in order to enable the code-form application to run in a certain environment, deployment is required, and whether the deployed application meets the requirements or not is verified.
At present, in the case of a large number of application deployment versions with frequent cycles, there is no effective method and tool for performing automatic verification after deployment of related application versions, time accumulation verification can only be performed in a manual naked eye mode, and the effectiveness of application release cannot be effectively detected for unstable factors existing in an application function verification stage. For example, after a large number of function modules are added to a certain web application, the display effect of each module can only be checked by manually clicking each module, whether each function module operates normally is determined, a disposal scheme is finally selected according to a verification result, and modes such as rollback, field repair, later update and the like can be selected.
It should be noted that the verification method, device, equipment and medium of the application deployment version disclosed by the present disclosure relate to the technical field of computers, and also relate to the technical fields of artificial intelligence, big data and internet of things.
It should be noted that, in the technical solution of the present disclosure, the acquisition, storage, application, and the like of the personal information of the related user all conform to the regulations of the related laws and regulations, and necessary security measures are taken without violating the good customs of the public order.
The embodiment of the disclosure provides a verification method of an application deployment version, which includes the following steps: deploying the application deployment version to form a target application; running a verification program, wherein the verification program comprises a first interface, a second interface and a third interface; receiving an input validation rule through a first interface; calling the main function program through a second interface to acquire data of the target application; verifying the data of the target application by the main function program according to the verification rule to obtain a verification result; and outputting the verification result through the third interface.
The verification method of the application deployment version of the embodiment of the disclosure can at least achieve one of the following technical effects:
1) the application deployment version can be automatically verified, the workload of related verification personnel is reduced, the verification time is shortened, and the verification efficiency is improved.
2) According to the input different verification rules, the verification of the application deployment versions with different requirements can be adapted, the accuracy and the verification efficiency of the verification of the application deployment versions are improved, and the work of related verification personnel is simplified.
3) By operating the verification program facing the relevant verification personnel and calling the main function program facing the target application, on one hand, the relevant verification personnel can participate in the verification process, namely, the verification rule is input and the verification result is checked, on the other hand, the main function program can automatically acquire the data of the target application and the data of the automatic verification target application to acquire the verification result, and the verification efficiency is higher.
Fig. 1 schematically illustrates a diagram of an application scenario for verification of an application deployment version according to an embodiment of the present disclosure.
As shown in fig. 1, the application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the verification method for the application deployment version provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the verification apparatus for the application deployment version provided by the embodiment of the present disclosure may be generally disposed in the server 105. The verification method for the application deployment version provided by the embodiment of the present disclosure may also be executed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Correspondingly, the verification apparatus for the application deployment version provided in the embodiment of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The following describes in detail a verification method of an application deployment version of the disclosed embodiment with fig. 2 to 5 based on the scenario described in fig. 1.
Fig. 2 schematically illustrates a flow chart of a method 200 for verification of an application deployment version in accordance with an embodiment of the disclosure.
As shown in fig. 2, the verification method 200 of the application deployment version of the embodiment includes operations S201 to S206.
In operation S201, deploying the application deployment version to form a target application;
in operation S202, running a verification program;
receiving an input validation rule through a first interface in operation S203;
in operation S204, calling the main function program through the second interface to acquire data of the target application;
verifying, by the main function program, the data of the target application according to the verification rule to obtain a verification result in operation S205; and
in operation S206, a verification result is output through the third interface.
It should be noted that, in the technical solution of the embodiment of the present disclosure, for an application of a certain version in a code form developed by a developer, in operation S201, an application deployment version is deployed to form a target application, where the "target application" refers to an application that is presented in a form that can run in a certain environment. If the verification method 200 according to the embodiment of the present disclosure is directed to a certain application that is completely deployed (i.e., has already been formed as a target application), the subsequent operations S202 to S206 may be directly performed without performing operation S201.
In the technical solution of the embodiment of the present disclosure, in operation S202, a "verification program" refers to a program capable of verifying a target application, where the verification program includes a first interface, a second interface, and a third interface, and the "verification program" faces to a relevant verifier and is started by the relevant verifier. In operation S203, the input validation rules are received through the first interface, and it should be understood that the validation rules of the target application are different for different requirements, and the validation rules can be input by the relevant validation personnel. In operation S204, the main function program is called through the second interface to acquire the data of the target application, and the "main function program" referred to herein faces the target application, and can implement the function of acquiring the data of the target application. In operation S205, the data of the target application is verified by the main function program according to the verification rule to obtain a verification result, i.e., the main function program can also implement a verification function that verifies the target application with the verification rule as a reference.
The verification method 200 for the application deployment version of the embodiment of the present disclosure can achieve at least one of the following technical effects:
1) the application deployment version can be automatically verified, the workload of related verification personnel is reduced, the verification time is shortened, and the verification efficiency is improved.
2) According to the input different verification rules, the verification of the application deployment versions with different requirements can be adapted, the accuracy and the verification efficiency of the verification of the application deployment versions are improved, and the work of related verification personnel is simplified.
3) By running the verification program facing the relevant verification personnel and calling the main function program facing the target application, on one hand, the relevant verification personnel can participate in the verification process, namely, the verification rule is input and the verification result is checked, on the other hand, the main function program can automatically acquire the data of the target application and the data of the automatic verification target application to acquire the verification result, and the verification efficiency is higher.
As shown in fig. 3, the verification method 300 of the application deployment version according to another embodiment of the present disclosure further includes operations S301 to S302.
Deploying a web container on an application server of a target application in operation S301;
in operation S302, a verification program is deployed on a web container.
A "web container" as referred to herein is a service program, and a program for providing a corresponding service is provided at a port of a server (specifically, an application server), and processes a request from a client (the client refers to a side facing a business person).
Illustratively, the web container may be a Tomcat container in Java.
Since the web container has: the technical scheme of the embodiment of the disclosure has the advantages of communication support (for example, a series of complex operations such as a listening port are encapsulated), life cycle management, multithreading support and the like.
It should be noted that operations S301 to S302 may also be performed after operation S201 and before operation S202.
Referring to fig. 2 and 4, according to the verification method 200 for the application deployment version of the embodiment of the disclosure, the calling the main function program through the second interface to obtain the data of the target application of operation S204 may include operations S41 to S45.
Accessing a web address of the target application in operation S41;
in operation S42, reading a web page source code of a target application;
in operation S43, the web page source code is cleaned according to the verification rule;
parsing the web page source code of the target application in operation S44;
in operation S45, relevant web page data of the parsed target application is obtained, wherein the relevant web page data corresponds to the verification rule.
In the technical solution of the embodiment of the present disclosure, in operation S41, the "website for accessing the target application" may specifically be a URL (uniform resource locator) address for accessing the target application.
It should be noted that the above-described web container is generated based on servlets, which are called servlets or service connectors, server-side programs written in Java, and have the characteristics of independent platforms and protocols, and the main functions of interactively browsing and generating data to generate dynamic web content. In combination with the URL address, the processing flow of the web container is: the associated verifier clicks on a URL address that points to a servlet, and the web container recognizes that the request is intended for a servlet, so two objects are created: the web container finds a corresponding servlet according to a URL in a request, creates or allocates a thread for the request, and transmits two object requests and responses to the servlet thread, the web container calls a service () method of the servlet, and according to different types of the requests, the service () method calls a dog () method or a dog () method, wherein the dog () method generates a dynamic page, then the page is filled into a response object, and finally, the thread is ended, the web container converts the response object into http corresponding to the http, transmits the http corresponding to a related verifier, and destroys the response and the request object.
It should be understood that the operations S41 through S45 are all implemented by a main function program, and for example, a program written by Java or Python may read the web source code according to the website of the target application, clean the web source code according to the verification rule, parse the web source code of the target application, and obtain the parsed relevant web data of the target application.
For example, by using 'Baidu' as target application and verifying 'Baidu' button, the main function program can access Baidu websitewww.baidu.comThe main function program can also specifically read the source code of the Baidu webpage in a checking element mode of the Baidu webpage, when the button of 'Baidu' is verified, the verification rule can be a corresponding verification label, the main function program can also clean and analyze the source code, finally, the related webpage data corresponding to the verification rule can be obtained, and the source code can be specifically read from the html label of the Baidu webpage "<input type is "submit" … … value is "Baidu" … …>", as the relevant web page data corresponding to the validation rule.
It should be noted that, in the technical solution of the embodiment of the present disclosure, the source code of the web page that can read the target application by accessing the website of the target application is limited to the source code of the general website, and the source code of the web page that needs to be verified, needs a certificate, and is encapsulated by a program cannot be obtained.
According to the technical scheme of the embodiment of the disclosure, the webpage source code can be acquired, cleaned and analyzed by the main function program in a mode of accessing the website of the target application, so that the related webpage data corresponding to the verification rule can be acquired, and the data acquisition mode is simple and convenient.
With reference to fig. 2 and 5, according to the verification method 200 for the application deployment version of the embodiment of the present disclosure, in operation S205, the main function program verifies data of the target application according to the verification rule to obtain a verification result, which specifically includes operations S51 to S52:
in operation S51, according to the validation rule, a corresponding validation module in the validation library is searched, wherein the validation module is associated with the data of the target application; and
in operation S52, it is determined whether the target application complies with the validation rule according to the returned status code of the validation module.
Taking an example that a certain function module is added in a certain application deployment version as an example for explanation, relevant verification personnel can input a label of the function module as a verification rule, search the verification module with a corresponding function through a main function program, judge whether the label of the newly added function module exists and can be called, judge whether the newly added function module accords with the verification rule according to a return state code of the verification module, and determine the newly added function module to be normal under the condition of conforming to the verification rule.
In the technical scheme of the embodiment of the disclosure, through operation S51-operation S52, the target application can be verified simply and conveniently according to the verification rule, and the way of the verification library allows the relevant verification personnel to add other verification modules to enrich the verification library.
For example, the verification library may be an existing library in Python, and for a certain type of application version and verification rules, the library has corresponding modules, for example, for the application version of the newly added module, the verification rule may be a tag for verifying the newly added module, and the library has a verification module for verifying the tag. The related verifying personnel also enrich the verification library according to different types of the verification versions, for example, only a verification module aiming at a newly added module is arranged in the initial verification library, and when the defect application version needs to be verified, the related verifying personnel can add the verification module for verifying the defect application version in the verification library.
According to the verification method 200 of the application deployment version of the embodiment of the disclosure, at least one of the steps of running the verification program, inputting the verification rule and outputting the verification result is executed through the web console.
The web console is a built-in modulator, and the relevant monitoring and debugging operations can be carried out by an authenticator through the web console.
In the technical scheme of the embodiment of the disclosure, the verification personnel can participate in the verification process through the independent web console, so that the verification personnel can operate visually and conveniently, and the work of the verification personnel is simplified.
Illustratively, running the validation program, inputting the validation rules, and outputting the validation results are all performed by the web console.
According to the verification method 200 of the application deployment version of the embodiment of the present disclosure, the application deployment version includes a new addition version and/or a defect repair version.
The "new version" referred to herein means an application having a new function or a new module, etc., compared to the previous version, and the "defect repair version" means that the application of the previous version has some defects, and the application of the current version needs to repair the defects based on the previous version.
It should be noted that, for the "new version", the verification library has a verification module for verifying the new module or the new function; for the 'defect repair version', a verification module for verifying defect repair is arranged in the verification library.
According to the verification method of the application deployment version, the verification program is a web program, and the main function program is a Python program.
The web program has the advantages of simple deployment, and convenient use, upgrade and maintenance; because the Python program has rich module libraries, supports the processing of various modules and is more convenient, the main function program can be written more conveniently by utilizing Python, and various required functions can be met.
Certainly, the main function program is not limited to the Python program, and the main function program written in other languages only needs to have the functions of accessing the website of the target application, reading the web page source code of the target application, cleaning and analyzing the web page source code according to the verification rule, verifying the data of the target application according to the verification rule, obtaining the verification result, and the like.
Based on the verification method of the application deployment version, the disclosure also provides a verification device of the application deployment version. The apparatus will be described in detail below with reference to fig. 6.
Fig. 6 schematically shows a block diagram of an authentication apparatus of an application deployment version according to an embodiment of the present disclosure.
As shown in fig. 6, the verification apparatus 400 of the application deployment version of the embodiment includes an application version deployment module 410, a verification program execution module 420, a verification rule receiving module 430, a main function program calling module 440, a verification module 450, and a verification result output module 460.
The application version deployment module 410 is configured to deploy the application version to form the target application, and in an embodiment, the application version deployment module 410 may be configured to perform the operation S201 described above, which is not described herein again.
The verification program running module 420 is configured to run a verification program, where the verification program includes a first interface, a second interface, and a third interface, and in an embodiment, the verification program running module 420 may be configured to perform the operation S202 described above, which is not described herein again.
The validation rule receiving module 430 is configured to receive an input validation rule through the first interface, and in an embodiment, the validation rule receiving module 430 may be configured to perform the operation S203 described above, which is not described herein again.
The main function program calling module 440 is configured to call the main function program through the second interface to obtain the data of the target application, and in an embodiment, the main function program calling module 440 may be configured to perform the operation S204 described above, which is not described herein again.
The verification module 450 is configured to verify the data of the target application by the main function program according to the verification rule to obtain a verification result, in an embodiment, the verification module 450 may be configured to perform the operation S205 described above, which is not described herein again.
The verification result output module 460 is configured to output the verification result through the third interface, and in an embodiment, the verification result output module 460 may be configured to perform the operation S206 described above, which is not described herein again.
According to the embodiment of the present disclosure, any of the application version deployment module 410, the verification program execution module 420, the verification rule receiving module 430, the main function program calling module 440, the verification module 450, and the verification result output module 460 may be combined into one module to be implemented, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to the embodiment of the present disclosure, at least one of the application version deployment module 410, the verification program execution module 420, the verification rule receiving module 430, the main function program calling module 440, the verification module 450, and the verification result output module 460 may be at least partially implemented as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three implementation manners of software, hardware, and firmware, or by a suitable combination of any of them. Alternatively, at least one of the application version deployment module 410, the verification program execution module 420, the verification rule receiving module 430, the main function program calling module 440, the verification module 450, and the verification result output module 460 may be at least partially implemented as a computer program module that can perform a corresponding function when executed.
Fig. 7 schematically shows a block diagram of an electronic device adapted to implement a verification method of an application deployment version according to an embodiment of the present disclosure.
As shown in fig. 7, an electronic device 500 according to an embodiment of the present disclosure includes a processor 501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. The processor 501 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 501 may also include onboard memory for caching purposes. Processor 501 may include a single processing unit or multiple processing units for performing different actions of a method flow according to embodiments of the disclosure.
In the RAM 503, various programs and data necessary for the operation of the electronic apparatus 500 are stored. The processor 501, the ROM 502, and the RAM 503 are connected to each other by a bus 504. The processor 501 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 502 and/or the RAM 503. Note that the programs may also be stored in one or more memories other than the ROM 502 and the RAM 503. The processor 501 may also perform various operations of method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, electronic device 500 may also include an input/output (I/O) interface 505, input/output (I/O) interface 505 also being connected to bus 504. The electronic device 500 may also include one or more of the following components connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include ROM 502 and/or RAM 503 and/or one or more memories other than ROM 502 and RAM 503 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method illustrated in the flow chart. When the computer program product runs in a computer system, the program code is used for causing the computer system to realize the verification method of the application deployment version provided by the embodiment of the disclosure.
The computer program performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure when executed by the processor 501. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed in the form of a signal on a network medium, downloaded and installed through the communication section 509, and/or installed from the removable medium 511. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511. The computer program, when executed by the processor 501, performs the above-described functions defined in the system of the embodiments of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.
Claims (10)
1. A verification method of an application deployment version is characterized by comprising the following steps:
deploying the application deployment version to form a target application;
running a verification program, wherein the verification program comprises a first interface, a second interface and a third interface;
receiving an input validation rule through the first interface;
calling a main function program through the second interface to acquire data of the target application;
verifying the data of the target application by the main function program according to the verification rule to obtain a verification result; and
and outputting the verification result through the third interface.
2. The method for verifying the deployment version of the application according to claim 1, further comprising:
deploying a web container on an application server of a target application;
deploying the authentication program on the web container.
3. The method for verifying the deployment version of the application as claimed in claim 1, wherein the calling the main function program through the second interface to obtain the data of the target application comprises:
accessing a website of the target application;
reading a webpage source code of a target application;
cleaning the webpage source codes according to the verification rule;
analyzing a webpage source code of a target application;
and acquiring the analyzed related webpage data of the target application, wherein the related webpage data correspond to the verification rule.
4. The method for verifying the deployment version of the application according to claim 1, wherein the verifying the data of the target application by the main function program according to the verification rule to obtain a verification result specifically comprises:
searching a corresponding verification module in a verification library according to the verification rule, wherein the verification module is associated with the data of the target application; and
and judging whether the target application meets the verification rule or not according to the returned state code of the verification module.
5. The method of claim 1, wherein at least one of the steps of running a validation program, inputting validation rules, and outputting the validation results is performed via a web console.
6. The method for verifying the application deployment version according to any one of claims 1 to 5, wherein the application deployment version comprises a new addition version and/or a defect repair version.
7. The method for verifying the deployment version of the application according to any one of claims 1 to 5, wherein the verification program is a web program, and the main function program is a Python program.
8. An apparatus for verifying an application version, comprising:
the application version deployment module is used for deploying the application version to form a target application;
the verification program running module is used for running a verification program, wherein the verification program comprises a first interface, a second interface and a third interface;
the verification rule receiving module is used for receiving an input verification rule through the first interface;
the main function program calling module is used for calling a main function program through the second interface so as to acquire the data of the target application;
the verification module is used for verifying the data of the target application by a main function program according to the verification rule so as to obtain a verification result; and
and the verification result output module is used for outputting the verification result through the third interface.
9. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-7.
10. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110829823.5A CN113535568B (en) | 2021-07-22 | 2021-07-22 | Verification method, device, equipment and medium for application deployment version |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110829823.5A CN113535568B (en) | 2021-07-22 | 2021-07-22 | Verification method, device, equipment and medium for application deployment version |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113535568A true CN113535568A (en) | 2021-10-22 |
CN113535568B CN113535568B (en) | 2023-09-05 |
Family
ID=78120470
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110829823.5A Active CN113535568B (en) | 2021-07-22 | 2021-07-22 | Verification method, device, equipment and medium for application deployment version |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113535568B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117215909A (en) * | 2023-07-26 | 2023-12-12 | 中电云计算技术有限公司 | Front-end code deployment checking method, device, equipment and medium |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050005163A1 (en) * | 2001-07-30 | 2005-01-06 | Kirkpatrick Mark A. | System and method for using web-based applications to validate data with validation functions |
US20050120024A1 (en) * | 2003-09-26 | 2005-06-02 | Tharpe James B.Jr. | Systems, methods, and computer program products for tracking and controlling Internet use and recovering costs associated therewith |
CN104050281A (en) * | 2014-06-26 | 2014-09-17 | 北京思特奇信息技术股份有限公司 | Webpage information extraction method and device based on http protocol |
US20140337830A1 (en) * | 2013-05-13 | 2014-11-13 | Sap Ag | Automated template deployment to computing platforms |
CN104765688A (en) * | 2015-04-17 | 2015-07-08 | 上海交通大学 | Verification system for Java program runtime capable of deploying rules dynamically |
US20170255542A1 (en) * | 2016-03-02 | 2017-09-07 | Bank Of America Corporation | System for automated code validation and deployment |
CN107239558A (en) * | 2017-06-09 | 2017-10-10 | 成都布林特信息技术有限公司 | Common interconnection network collecting method |
CN109254921A (en) * | 2018-09-18 | 2019-01-22 | 平安科技(深圳)有限公司 | Application version verification method, device, computer equipment and storage medium |
CN110188159A (en) * | 2019-05-27 | 2019-08-30 | 深圳前海微众银行股份有限公司 | Collage-credit data cut-in method, device, equipment and computer readable storage medium |
WO2019232828A1 (en) * | 2018-06-06 | 2019-12-12 | 平安科技(深圳)有限公司 | Script deployment method and apparatus, and computer device and storage medium |
CN111045756A (en) * | 2019-12-10 | 2020-04-21 | 中国工商银行股份有限公司 | Method, apparatus, computing device, and medium for generating interface service |
CN111597114A (en) * | 2020-05-18 | 2020-08-28 | 北京百度网讯科技有限公司 | Method, device and equipment for verifying small program and storage medium |
CN111651171A (en) * | 2020-06-05 | 2020-09-11 | 中国银行股份有限公司 | Interface version deployment method and device, electronic equipment and storage medium |
CN111666210A (en) * | 2020-05-20 | 2020-09-15 | 新华三半导体技术有限公司 | Chip verification method and device |
CN111917783A (en) * | 2020-08-06 | 2020-11-10 | 吉林亿联银行股份有限公司 | Method, device and storage medium for verifying general message |
-
2021
- 2021-07-22 CN CN202110829823.5A patent/CN113535568B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050005163A1 (en) * | 2001-07-30 | 2005-01-06 | Kirkpatrick Mark A. | System and method for using web-based applications to validate data with validation functions |
US20050120024A1 (en) * | 2003-09-26 | 2005-06-02 | Tharpe James B.Jr. | Systems, methods, and computer program products for tracking and controlling Internet use and recovering costs associated therewith |
US20140337830A1 (en) * | 2013-05-13 | 2014-11-13 | Sap Ag | Automated template deployment to computing platforms |
CN104050281A (en) * | 2014-06-26 | 2014-09-17 | 北京思特奇信息技术股份有限公司 | Webpage information extraction method and device based on http protocol |
CN104765688A (en) * | 2015-04-17 | 2015-07-08 | 上海交通大学 | Verification system for Java program runtime capable of deploying rules dynamically |
US20170255542A1 (en) * | 2016-03-02 | 2017-09-07 | Bank Of America Corporation | System for automated code validation and deployment |
CN107239558A (en) * | 2017-06-09 | 2017-10-10 | 成都布林特信息技术有限公司 | Common interconnection network collecting method |
WO2019232828A1 (en) * | 2018-06-06 | 2019-12-12 | 平安科技(深圳)有限公司 | Script deployment method and apparatus, and computer device and storage medium |
CN109254921A (en) * | 2018-09-18 | 2019-01-22 | 平安科技(深圳)有限公司 | Application version verification method, device, computer equipment and storage medium |
CN110188159A (en) * | 2019-05-27 | 2019-08-30 | 深圳前海微众银行股份有限公司 | Collage-credit data cut-in method, device, equipment and computer readable storage medium |
CN111045756A (en) * | 2019-12-10 | 2020-04-21 | 中国工商银行股份有限公司 | Method, apparatus, computing device, and medium for generating interface service |
CN111597114A (en) * | 2020-05-18 | 2020-08-28 | 北京百度网讯科技有限公司 | Method, device and equipment for verifying small program and storage medium |
CN111666210A (en) * | 2020-05-20 | 2020-09-15 | 新华三半导体技术有限公司 | Chip verification method and device |
CN111651171A (en) * | 2020-06-05 | 2020-09-11 | 中国银行股份有限公司 | Interface version deployment method and device, electronic equipment and storage medium |
CN111917783A (en) * | 2020-08-06 | 2020-11-10 | 吉林亿联银行股份有限公司 | Method, device and storage medium for verifying general message |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117215909A (en) * | 2023-07-26 | 2023-12-12 | 中电云计算技术有限公司 | Front-end code deployment checking method, device, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN113535568B (en) | 2023-09-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113900834B (en) | Data processing method, device, equipment and storage medium based on Internet of things technology | |
CN114237651A (en) | Installation method and device of cloud native application, electronic equipment and medium | |
CN113138757A (en) | Method, device, server, system and medium for automatically generating front-end code | |
CN117076280A (en) | Policy generation method and device, electronic equipment and computer readable storage medium | |
CN113986258A (en) | Service publishing method, device, equipment and storage medium | |
CN113535568B (en) | Verification method, device, equipment and medium for application deployment version | |
CN113362173A (en) | Anti-duplication mechanism verification method, anti-duplication mechanism verification system, electronic equipment and storage medium | |
CN113535577A (en) | Application testing method and device based on knowledge graph, electronic equipment and medium | |
CN113176907A (en) | Interface data calling method and device, computer system and readable storage medium | |
CN111930629A (en) | Page testing method and device, electronic equipment and storage medium | |
CN116841902A (en) | Health state checking method, device, equipment and storage medium | |
CN116483888A (en) | Program evaluation method and device, electronic equipment and computer readable storage medium | |
CN113535565B (en) | Interface use case generation method, device, equipment and medium | |
CN114817921A (en) | Code rectification method and device | |
CN115080434A (en) | Case execution method, device, equipment and medium | |
CN115203178A (en) | Data quality inspection method and device, electronic equipment and storage medium | |
CN114490264A (en) | File monitoring method and device of application system, electronic equipment and storage medium | |
CN112506781A (en) | Test monitoring method, test monitoring device, electronic device, storage medium, and program product | |
CN113094268A (en) | Test method, device, equipment, medium and program product | |
CN114640585B (en) | Resource updating method and device, electronic equipment and storage medium | |
CN115190008B (en) | Fault processing method, fault processing device, electronic equipment and storage medium | |
CN111290870A (en) | Method and device for detecting abnormity | |
CN114064484A (en) | Interface testing method and device, electronic equipment and readable storage medium | |
CN115629983A (en) | Test case set generation method, device, equipment and medium | |
CN114938341A (en) | Environment detection method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |