CN115629964A - Access method, apparatus, device, storage medium and computer program product - Google Patents

Access method, apparatus, device, storage medium and computer program product Download PDF

Info

Publication number
CN115629964A
CN115629964A CN202211183737.2A CN202211183737A CN115629964A CN 115629964 A CN115629964 A CN 115629964A CN 202211183737 A CN202211183737 A CN 202211183737A CN 115629964 A CN115629964 A CN 115629964A
Authority
CN
China
Prior art keywords
target
interface
controls
login
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211183737.2A
Other languages
Chinese (zh)
Inventor
杨雨佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202211183737.2A priority Critical patent/CN115629964A/en
Publication of CN115629964A publication Critical patent/CN115629964A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3696Methods or tools to render software testable
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3664Environments for testing or debugging software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The application discloses an access method, an access device, an access equipment, a storage medium and a computer program product, wherein the method comprises the following steps: displaying a first interface, wherein the first interface is a display interface corresponding to a target plug-in a browser, the first interface comprises a plurality of first controls, the plurality of first controls respectively correspond to a plurality of pieces of login information built in the target plug-in, and the plurality of pieces of login information are information related to a plurality of development and test environments for logging in at least one target project; and under the condition that a first input to a first target control is received, responding to the first input, and accessing the development test environment according to the login information corresponding to the first target control, wherein the first target control is any one of the plurality of first controls. The method and the device can solve the problems that the test development work efficiency is low and the data leakage risk is high in the prior art.

Description

Access method, device, equipment, storage medium and computer program product
Technical Field
The present application relates to the field of data processing technologies, and in particular, to an access method, apparatus, device, computer storage medium, and computer program product.
Background
Web applications are popular with a large audience because they do not require downloading a dedicated client. In the development stage of the Web application, when development testers, particularly members newly joining a team, enter a development test environment, information such as various test account numbers and test environment addresses needs to be repeatedly inquired of others, so that the overall work efficiency of the team is reduced, and a high data leakage risk exists in the process of repeatedly inquiring the information such as the test account numbers and the test environment addresses.
Disclosure of Invention
The embodiment of the application provides an access method, an access device, equipment, a storage medium and a computer program product, which can solve the problems of low test development work efficiency and high data leakage risk caused by the prior art.
In a first aspect, an access method is provided, including:
displaying a first interface, wherein the first interface is a display interface corresponding to a target plug-in a browser, the first interface comprises a plurality of first controls, the plurality of first controls respectively correspond to a plurality of pieces of login information built in the target plug-in, and the plurality of pieces of login information are information related to a plurality of development and test environments for logging in at least one target project;
and under the condition that a first input to a first target control is received, responding to the first input, and accessing the development test environment according to the login information corresponding to the first target control, wherein the first target control is any one of the plurality of first controls.
Optionally, accessing the development test environment according to the login information corresponding to the first target control, including:
and displaying a second interface, wherein the second interface is a display interface corresponding to the target address, the login information comprises a login address, the login address indicates an address for logging in the development test environment of the target project, and the target address is a login address in the login information corresponding to the first target control.
Optionally, the login information further includes a plurality of account information under the login address, a plurality of second controls are displayed on the second interface, and the plurality of second controls respectively correspond to the plurality of account information under the target address;
after displaying the second interface, the method further comprises:
and under the condition that second input to a second target control is received, responding to the second input, and logging in according to account information corresponding to the second target control, wherein the second target control is any one of the plurality of second controls.
Optionally, a plurality of third controls are also displayed on the second interface, and the plurality of third controls correspond to the plurality of second controls;
after displaying the second interface, the method further comprises:
and under the condition that a third input to the third target control is received, responding to the third input, and executing an operation associated with the third input to a second control corresponding to the third target control, wherein the plurality of third controls comprise the third target control.
Optionally, displaying a second interface comprising:
displaying a plurality of second controls in the first display area, and displaying an input box in the second display area, wherein the second interface comprises the first display area and the second display area;
after displaying the second interface, the method further comprises:
when an input object is displayed in the input box, registration is performed according to the input object.
Optionally, the first interface further includes a fourth control, the fourth control corresponds to target login information, and the target login information indicates account information in which the number of uses of any login address exceeds a threshold number of times;
after displaying the first interface, the method further comprises:
and in the case of receiving a fourth input to the fourth control, responding to the fourth input, and accessing the development testing environment according to the login address and the account information indicated by the target login information.
Optionally, before displaying the first interface, the method further includes:
acquiring an installation package corresponding to a target plug-in;
and in the case of receiving the installation instruction, installing the target plug-in the browser through the installation package.
In a second aspect, an access device is provided, including:
the display module is used for displaying a first interface, the first interface is a display interface corresponding to a target plug-in a browser, the first interface comprises a plurality of first controls, the plurality of first controls respectively correspond to a plurality of pieces of login information built in the target plug-in, and the plurality of pieces of login information are information related to a plurality of development and test environments for logging in at least one target project;
and the access module is used for responding to the first input and accessing the development test environment according to the login information corresponding to the first target control under the condition that the first input to the first target control is received, wherein the first target control is any one of the plurality of first controls.
In a third aspect, an access device is provided, the access device comprising a memory, a processor, and a computer program stored in the memory and running on the processor, the computer program performing the access method according to the first aspect.
In a fourth aspect, there is provided a computer storage medium which, when executed by a processor, implements the access method of the first aspect.
In a fifth aspect, a computer program product is provided, the computer program product comprising a computer program which, when executed by a processor, implements the access method of the first aspect.
Compared with the prior art, according to the access method, the access device, the access equipment, the access storage medium and the computer program product, the first interface is displayed, the first interface comprises a plurality of first controls, the first controls respectively correspond to a plurality of pieces of login information built in the target plug-in, and the login information is information related to a plurality of development test environments for logging in at least one target project; and under the condition that a first input to a first target control is received, responding to the first input, and accessing the development testing environment according to the login information corresponding to the first target control, wherein the first target control is any one of the plurality of first controls. The login information is executed according to the login information corresponding to the first target control when the development test environment is accessed, the login information is built in the target plug-in of the browser, information related to the development test environment for logging in at least one target project can be indicated, and the login information corresponds to the first control displayed in the display interface corresponding to the target plug-in, so that the required development test environment can be directly triggered to enter through the login information corresponding to the selected first target control, mutual inquiry among members of the development project team is not needed, the overall work efficiency of the team is indirectly improved, and the target plug-in of the browser is directly used for internally setting the login information, so that the decoupling of the login information is realized, the data leakage risk is reduced, and the problems of low test development work efficiency and higher data leakage risk caused by the prior art are solved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is an alternative flow chart of an embodiment of the access method of the present application.
Fig. 2 is a schematic diagram of an optional display of a first interface in an embodiment of the access method of the present application.
Fig. 3 is another alternative flow chart of an embodiment of the access method of the present application.
Fig. 4 is a schematic diagram of an optional display of a second interface in an embodiment of the access method of the present application.
Fig. 5 is a schematic block diagram of an access device according to an embodiment of the present application.
Fig. 6 is a schematic block diagram of an access device of an embodiment of the present application.
Detailed Description
Features of various aspects of the present application and exemplary embodiments will be described in detail below. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The embodiments will be described in detail below with reference to the accompanying drawings.
In addition, it should be noted that, in the following embodiments of the present application, the acquisition, storage, use, processing, etc. of data all conform to relevant regulations of national laws and regulations.
A Web application (hereinafter referred to as a Web application) is an application that can be accessed through the Web. The Web application is composed of various Web components for completing specific tasks, and finally, data and/or services generated by processing of the various Web components can be displayed to the outside through the Web.
The WEB application generally adopts a browser/server architecture to operate in a wide area network, and has the advantages of uniform platform and interactive experience, no need of downloading a special client and the like because the WEB application is based on a browser, and is widely applied to various industries.
Nowadays, web applications are popular in various industries, and development and test teams for Web applications are gradually expanding. Often, a development testing team will involve multiple Web application projects, each of which presents multiple sets of environments.
When a development tester, especially a member newly joining a team, enters a development test environment, information such as various test account numbers and test environment addresses needs to be repeatedly inquired from other team members, so that the overall work efficiency of the development test team is reduced, and a high data leakage risk exists in the process of repeatedly inquiring the information such as the test account numbers and the test environment addresses.
In order to solve the above problem, embodiments of the present application provide an access method, an apparatus, a device, a computer storage medium, and a computer program product, and the access method according to the embodiments of the present application will be described below with reference to fig. 1.
Referring to fig. 1, in an alternative embodiment, the method may include:
and S110, displaying a first interface, wherein the first interface is a display interface corresponding to a target plug-in a browser, the first interface may include a plurality of first controls, the plurality of first controls respectively correspond to a plurality of pieces of login information built in the target plug-in, and the plurality of pieces of login information are information related to a plurality of development test environments for logging in at least one target project.
And S120, under the condition that a first input to a first target control is received, responding to the first input, and accessing the development testing environment according to the login information corresponding to the first target control, wherein the first target control is any one of the plurality of first controls.
The method includes the steps that a first interface is displayed, the first interface can comprise a plurality of first controls, the first controls respectively correspond to a plurality of pieces of login information built in a target plug-in, and the login information is information related to a plurality of development test environments for logging in at least one target project; and under the condition that a first input to a first target control is received, responding to the first input, and accessing the development testing environment according to the login information corresponding to the first target control, wherein the first target control is any one of the plurality of first controls. The login information is executed according to the login information corresponding to the first target control when the development test environment is accessed, the login information is built in the target plug-in of the browser, information related to the development test environment for logging in at least one target project can be indicated, and the login information corresponds to the first control displayed in the display interface corresponding to the target plug-in, so that the required development test environment can be directly triggered to enter through the login information corresponding to the selected first target control, mutual inquiry among members of the development project team is not needed, the overall work efficiency of the team is indirectly improved, and the target plug-in of the browser is directly used for internally setting the login information, so that the decoupling of the login information is realized, the data leakage risk is reduced, and the problems of low test development work efficiency and higher data leakage risk caused by the prior art are solved.
In some optional examples, the access method may be applied to an electronic device having a display module, such as a computer, a tablet computer, and a mobile phone, and may also be applied to a browser in the electronic device.
In some optional examples, before S110, the access method may further include:
acquiring an installation package corresponding to a target plug-in; and in the case of receiving the installation instruction, installing the target plug-in the browser through the installation package.
It should be noted that the installation package may be directly obtained from the intranet environment or the local storage before the first use. The user may consider that the installation instruction is received when clicking the touch position mapped to the area where the installation package is located with a finger, or clicking the area where the installation package is located with a mouse, a keyboard, or the like, and the electronic device may analyze the content in the installation package according to the installation instruction, so as to install the target plug-in the browser.
All login information related to the current development and test environment is built in the installation package, and when a new target project is related or updated login information needs to be replaced, the installation package can be automatically updated at any time, so that the target plug-in is updated. The method for utilizing the built-in login information of the target plug-in and updating the built-in login information of the target plug-in does not need a user to acquire the published address information from the distributed version control system one by one and then store the address information one by one, and can avoid the situation that the acquired address information is lagged and difficult to use, so that the development and test environment can be updated in time through the installation and the updating of the installation package.
It should be further noted that the target plug-in the browser is obtained through installation, so that the process of directly saving, knowing and accessing specific login information through the browser is avoided, rapid access for developing a test environment is achieved, and meanwhile, the content of the actual login information is completely decoupled from the installation and use process of a user, so that the risk of high data leakage in the process of repeatedly inquiring information such as a test account number and a test environment address can be reduced.
In some optional examples, in S110, the application/plug-in the browser may be written by open source software, and the target plug-in may be, for example, a Chrome plug-in, may be developed by vue2.X, or may be developed by browser-specific development software.
For example, when a person of a development testing team (which may be referred to as a user later) needs to access the development testing environment, a browser application icon in the electronic device may be touched, and at this time, the browser may respond to the touch operation to further display a display interface corresponding to the browser.
The display interface may include a first area that may present all plug-ins that the browser has currently installed, which may include target plug-ins. Or, the display interface corresponding to the browser may also include a plug-in management icon, and when the browser in the electronic device receives an input for the plug-in management icon, all plug-ins currently installed by the browser may be displayed. Finally, the user can select the target plug-in, and the browser can display the first interface at the moment.
In some optional examples, please refer to fig. 1 and fig. 2 together, where fig. 2 is a schematic view of an optional display of a first interface, and the first interface may be included in a display interface corresponding to a browser displayed by the touch browser application icon.
In other alternative examples, the first interface may be a new interface to be re-presented.
The first interface may include a plurality of first controls, the plurality of first controls may respectively correspond to a plurality of pieces of login information built in the target plug-in, and the plurality of pieces of login information may be information related to a plurality of development test environments for logging in at least one target project.
The login information may include at least one of an address to login to the development test environment, an account number to login to the development test environment, and/or a password.
Continuing with the above illustration of the display diagram of the first interface shown in fig. 2, fig. 2 shows a plurality of first controls corresponding to the first target item and a plurality of first controls corresponding to the second target item, where the first target item and the second target item may be included in the target item. The plurality of first controls can be arranged in an aggregation mode according to the target items to which the first controls belong, and therefore the user can be facilitated to quickly select the required first target control.
The plurality of first controls can include at least one of a first control for logging into a local environment in the electronic device, a first control for logging into a Web application development environment, a first control for logging into a Web application testing environment, and a first control for logging into a Web application production environment.
In some optional examples, the colors of the different first controls may also be set according to the test environments logged into different development test environments, for example, the first controls logged into the local environments of different target items may all be a first color, the first controls logged into the test environments of different target items may all be a second color, and the first color and the second color are different, thereby enhancing the directivity of the different first controls.
In some optional examples, in S120, the first input may be a touch operation of the user on a touch area mapped by a position of the first target control through a touch module of the electronic device, or an operation performed through a keyboard or a mouse connected to the electronic device. The first target control in the multiple first controls can be determined through the first input, the browser can search the login information corresponding to the first target control in the target plug-in unit through the first target control, and then the development testing environment is accessed through the first login information.
Optionally, referring to fig. 3, the process of accessing the development test environment according to the login information corresponding to the first target control in S120 may include:
and S310, displaying a second interface, wherein the second interface is a display interface corresponding to the target address, the login information may include a login address, the login address indicates an address of the development test environment of the login target project, and the target address is a login address in the login information corresponding to the first target control.
In this example, the login address included in the login information may be a development test environment address of the login target item, and when the user selects the first target control through the first input, the login address in the login information corresponding to the first target control is the target address. Therefore, the browser can respond to the first input and further jump to and access the display interface corresponding to the target address.
In the examples, the target project development test environment can be quickly accessed through the login address in the login information built in the target plug-in of the browser, convenience and quickness are achieved, and the data use safety is improved.
In some optional examples, the login information may further include a plurality of account information at the login address, the second interface may display a plurality of second controls, and the plurality of second controls may respectively correspond to the plurality of account information at the target address.
With continuing reference to fig. 3 and with further reference to fig. 4, fig. 4 is an optional display diagram of a second interface, in this embodiment, a case is considered where the development test environment address needs to be logged in and at least one type of account information is involved in the login.
It can be understood that, in order to ensure the normal use of the Web application, the development tester needs to perform testing, debugging and configuration, and so on, and at this time, different common testing/development accounts need to be used, and the authority of these testing/development accounts may be different. For the common test/development accounts, if the direct records are easily revealed in the documents, the account information is easily and directly exposed by the mutual sharing among team members, and the data security of the Web application is easily influenced.
To this end, after the second interface is displayed at S310, the method may further include S320.
And S320, under the condition that a second input to a second target control is received, responding to the second input, and logging in according to account information corresponding to the second target control, wherein the second target control is any one of a plurality of second controls.
In this example, when the development test environment needs to be verified by the login authority to enter, the second interface is a login interface, and different development test environments may display various shared development/test accounts used by different development test environments.
Exemplarily, fig. 4 shows an optional display diagram of the second interface in the embodiment of the present application. On this basis, for example in connection with the exemplary first control type, the login interface of the different types of development testing environments may be similar to the login interface used by the audience.
The main differences between the login of the development test environment and the login interface used by the audience are as follows: a plurality of second controls are displayed in the second interface, and the plurality of second controls may respectively correspond to the plurality of account information under the destination address.
It will be appreciated that there may be a plurality of account information under the corresponding login address for other first controls other than the first target control selected by the first input. The account information under different login addresses is usually not consistent, and of course may be consistent. Therefore, account information under different login addresses is stored through login information built in the target plug-in, all addresses under different development and test environments and account information applicable to the addresses can be accurately managed, and information is integrated.
The permissions corresponding to the plurality of account information corresponding to the plurality of second controls may not be consistent, for example, the permissions corresponding to some account information may have all permissions in the development test environment, the permissions corresponding to some account information may only be capable of performing front-end page configuration debugging, and the permissions corresponding to some account information may only be capable of performing maintenance of the customer information.
Continuing with the example of fig. 4, when the user selects the second target control in the second interface according to the second input, the browser may obtain account information corresponding to the second target control, and then perform login verification using the account information, after the login verification is successful, the browser may jump and access the formal development test environment, and the subsequent user may perform operations such as debugging and development.
In the embodiments, account information corresponding to the second target control under the target address in the login information can be acquired by means of second input of the second target control in the second interface, and then the development test environment to which the target address belongs can be accessed through login of the account information, so that one-key access of the development test environment is realized, account information under the target address is decoupled from user use, and data security is improved.
In still other alternative examples, the second interface may further display a plurality of third controls, and the plurality of third controls may correspond to the plurality of second controls. With continued reference to fig. 3 and 4, after displaying the second interface at S310, the method may further include:
s330, in a case that a third input to the third target control is received, in response to the third input, an operation associated with the third input is performed on a second control corresponding to the third target control, where the plurality of third controls may include the third target control.
It should be noted that the third target control may be a trigger control for performing editing processing on the associated second control. For example, referring to fig. 4, the third control may be divided into a first sub-control, a second sub-control, a third sub-control and a fourth sub-control according to different editing processing functions, and in other examples, the third control associated with each second control may also have different types.
When a plurality of second controls and third controls corresponding to the second controls are displayed on a second interface, if a user needs to add remarks/labels to enhance identifiability of the second controls, perform sequencing management on the second controls, or edit control names displayed by the second controls, and the like, the electronic device can be operated and a third target control can be selected, and then the position of the third target control in the second interface can be touched by a finger or an external device, so that a browser or the electronic device receives a third input aiming at the third target control, and further, according to the function of the third target control, the second controls associated with the third target control are subjected to processing operation of corresponding functions.
For example, when the third target control belongs to the first sub-control, a top setting operation may be performed on the second control associated with the third target control; when the third target control belongs to the second sub-control, the label of the second control associated with the third target control can be edited; and when the third target control belongs to the third sub-control, deleting the second control associated with the third target control.
In these examples, a third control associated with the second control is provided, and a corresponding operation of the second control can be realized by means of a third input, thereby meeting personalized requirements of different users.
In still other alternative examples, the second interface may include a first display area and a second display area. When the second interface is displayed, the plurality of second controls may be displayed in the first display area, the input box may be displayed in the second display area, and the entry may be performed according to the input object when the input object is displayed in the input box.
It can be understood that when the user needs to perform a normal login operation or login using login information that is not corresponding to the second control, the input object may be input into the input box to realize the login of the input object.
The second display area may further include a login control, and when an input object is displayed in the input box and an input for the login control is received, the second display area may respond to the input and perform login according to the input object.
In these examples, a login manner other than using the second control is given, and the login manner is more comprehensive and various.
In still other optional examples, please continue to refer to fig. 2, the first interface may further include a fourth control, where the fourth control corresponds to target login information, and the target login information indicates account information that is used at any login address more than a threshold number of times.
After the first interface is displayed, the development testing environment can be accessed according to the login address and the account information indicated by the target login information in response to the fourth input when the fourth input to the fourth control is received.
It should be noted that, after the user logs in by using the target plug-in for multiple times, the browser or the target plug-in may record the number of times of using different login information by the user, and further set a fourth control on the first interface according to the login information that the number of times of using exceeds the threshold value of the number of times under any login address. When the development test environment is used subsequently, the development test environment can be accessed according to the login information and the account address indicated by the target login information as long as the fourth input is executed on the fourth control at the first interface. In the examples, the fourth control realizes quick login of the common development test environment, and is convenient and quick.
The access method according to the embodiment of the present application is described in detail above with reference to fig. 1 to 4, and the access device according to the embodiment of the present application is described in detail below with reference to fig. 5.
Referring to fig. 5, in an embodiment, the access device may include:
the display module 510 may be configured to display a first interface, where the first interface is a display interface corresponding to a target plugin in a browser, and the first interface may include a plurality of first controls, the plurality of first controls respectively correspond to a plurality of pieces of login information that are built in the target plugin, and the plurality of pieces of login information are information related to a plurality of development test environments for logging in at least one target project;
the accessing module 520 may be configured to, in a case that a first input to a first target control is received, respond to the first input, and access the development test environment according to login information corresponding to the first target control, where the first target control is any one of the plurality of first controls.
In an alternative example, the accessing module 520 may include:
the display unit may be configured to display a second interface, where the second interface is a display interface corresponding to the target address, the login information may include a login address, the login address indicates an address of a development test environment for logging in the target project, and the target address is a login address in the login information corresponding to the first target control.
In another optional example, the login information may further include a plurality of account information under the login address, a plurality of second controls are displayed on the second interface, and the plurality of second controls respectively correspond to the plurality of account information under the target address;
the apparatus may further include:
the login module may be configured to, after the display unit displays the second interface, respond to a second input when the second input to the second target control is received, and perform login according to account information corresponding to the second target control, where the second target control is any one of the plurality of second controls.
In still other alternative examples, the second interface further displays a plurality of third controls, the plurality of third controls corresponding to the plurality of second controls; the apparatus may further include:
the execution module may be configured to, after the display unit displays the second interface, execute, in response to a third input, an operation associated with the third input on a second control corresponding to a third target control in a case where the third input on the third target control is received, where the plurality of third controls may include the third target control.
In still other alternative examples, the display unit may be further configured to: displaying a plurality of second controls in the first display area and displaying an input box in the second display area, wherein the second interface can comprise the first display area and the second display area;
the apparatus may further include:
the login module may be configured to log in according to the input object when the input object is displayed in the input box after the display unit displays the second interface.
In still other optional examples, the first interface may further include a fourth control, where the fourth control corresponds to target login information, and the target login information indicates account information of which the number of times of use exceeds a threshold number of times at any login address;
the accessing module 520 may be further configured to, after the display unit displays the first interface, in a case where a fourth input to the fourth control is received, access the development test environment according to the login address and the account information indicated by the target login information in response to the fourth input.
In still other optional examples, the apparatus may further comprise:
the acquisition module can be used for acquiring the installation package corresponding to the target plug-in;
the installation module can be used for installing the target plug-in the browser through the installation package under the condition that the installation instruction is received.
Fig. 6 shows a hardware structure diagram of an access device provided in an embodiment of the present application. The access device may include, among other things, a processor 601 and a memory 602 in which computer program instructions are stored.
Specifically, the processor 601 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 602 may include mass storage for data or instructions. By way of example, and not limitation, memory 602 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, tape, or Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 602 may include removable or non-removable (or fixed) media, where appropriate. The memory 602 may be internal or external to the access device, where appropriate. In a particular embodiment, the memory 602 is a non-volatile solid-state memory.
The memory 602 may include Read Only Memory (ROM), flash memory devices, random Access Memory (RAM), magnetic disk storage media devices, optical storage media devices, electrical, optical, or other physical/tangible memory storage devices. Thus, in general, the memory 602 includes one or more tangible (non-transitory) computer-readable storage media (e.g., a memory device) encoded with software comprising computer-executable instructions and when the software is executed (e.g., by one or more processors) it is operable to perform operations described with reference to the methods in accordance with the above-described aspects of the disclosure.
The processor 601 realizes any one of the access methods in the above embodiments by reading and executing computer program instructions stored in the memory 602.
In one example, the access device may also include a communication interface 603 and a bus 610. As shown in fig. 6, the processor 601, the memory 602, and the communication interface 603 are connected via a bus 610 to complete communication therebetween.
The communication interface 603 is mainly used for implementing communication between modules, apparatuses, units and/or devices in the embodiments of the present application.
Bus 610 includes hardware, software, or both to couple the components of the access device to each other. By way of example, and not limitation, a bus may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industrial Standard Architecture (EISA) bus, a Front Side Bus (FSB), a Hyper Transport (HT) interconnect, an Industrial Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus or a combination of two or more of these. Bus 610 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the present application, any suitable buses or interconnects are contemplated by the present application.
The access device may be based on an access method, thereby implementing the access method and apparatus described in conjunction with fig. 1-5.
In addition, in combination with the access method in the foregoing embodiments, the embodiments of the present application may be implemented by providing a computer storage medium. The computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement any of the access methods in the above embodiments.
In addition, a computer program product is provided in the embodiments of the present application, which includes a computer program, and when the computer program is executed by a processor, the steps and corresponding contents of the foregoing method embodiments may be implemented.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It should be understood that in the embodiment of the present application, "B corresponding to a" means that B is associated with a, from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may be determined from a and/or other information.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention, and these modifications or substitutions are intended to be included in the scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (11)

1. An access method, comprising:
displaying a first interface, wherein the first interface is a display interface corresponding to a target plug-in a browser, the first interface comprises a plurality of first controls, the plurality of first controls respectively correspond to a plurality of pieces of login information built in the target plug-in, and the plurality of pieces of login information are information related to a plurality of development and test environments for logging in at least one target project;
under the condition that a first input to a first target control is received, responding to the first input, and accessing a development test environment according to login information corresponding to the first target control, wherein the first target control is any one of a plurality of first controls.
2. The method of claim 1, wherein accessing a development test environment according to the login information corresponding to the first target control comprises:
and displaying a second interface, wherein the second interface is a display interface corresponding to a target address, the login information comprises a login address, the login address indicates an address of a development test environment of a login target project, and the target address is a login address in the login information corresponding to the first target control.
3. The method according to claim 2, wherein the login information further includes a plurality of account information at the login address, the second interface displays a plurality of second controls, and the plurality of second controls respectively correspond to the plurality of account information at the target address;
after the displaying the second interface, the method further comprises:
and under the condition that second input to a second target control is received, responding to the second input, and logging in according to account information corresponding to the second target control, wherein the second target control is any one of the plurality of second controls.
4. The method according to claim 3, wherein a plurality of third controls are displayed on the second interface, and a plurality of the third controls correspond to a plurality of the second controls;
after the displaying the second interface, the method further comprises:
and under the condition that a third input to a third target control is received, responding to the third input, and executing an operation associated with the third input to a second control corresponding to the third target control, wherein the third controls comprise the third target control.
5. The method of claim 3, wherein displaying the second interface comprises:
displaying a plurality of second controls in a first display area, and displaying an input box in a second display area, wherein the second interface comprises the first display area and the second display area;
after the displaying the second interface, the method further comprises:
and when an input object is displayed in the input box, registering according to the input object.
6. The method of claim 3, wherein the first interface further comprises a fourth control, wherein the fourth control corresponds to target login information, and the target login information indicates account information of which the number of times of use exceeds a threshold number of times at any login address;
after the displaying the first interface, the method further comprises:
and under the condition that a fourth input to a fourth control is received, responding to the fourth input, and accessing a development test environment according to the login address and the account information indicated by the target login information.
7. The method of any of claims 1-6, wherein prior to displaying the first interface, the method further comprises:
acquiring an installation package corresponding to the target plug-in;
and in the case of receiving an installation instruction, installing the target plug-in the browser through the installation package.
8. An access device, the device comprising:
the display module is used for displaying a first interface, the first interface is a display interface corresponding to a target plug-in a browser, the first interface comprises a plurality of first controls, the plurality of first controls respectively correspond to a plurality of pieces of login information built in the target plug-in, and the plurality of pieces of login information are information related to a plurality of development and test environments for logging in at least one target project;
the access module is used for responding to a first input under the condition that the first input to a first target control is received and accessing a development testing environment according to login information corresponding to the first target control, wherein the first target control is any one of a plurality of first controls.
9. An access device, characterized in that the access device comprises a memory, a processor and a computer program stored in the memory and running on the processor, the computer program performing the access method according to any one of claims 1 to 7.
10. A computer storage medium, wherein the computer storage medium, when executed by a processor, implements the access method of any one of claims 1 to 7.
11. A computer program product, characterized in that the computer program product comprises a computer program which, when being executed by a processor, carries out the steps of the access method according to any one of claims 1 to 7.
CN202211183737.2A 2022-09-27 2022-09-27 Access method, apparatus, device, storage medium and computer program product Pending CN115629964A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211183737.2A CN115629964A (en) 2022-09-27 2022-09-27 Access method, apparatus, device, storage medium and computer program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211183737.2A CN115629964A (en) 2022-09-27 2022-09-27 Access method, apparatus, device, storage medium and computer program product

Publications (1)

Publication Number Publication Date
CN115629964A true CN115629964A (en) 2023-01-20

Family

ID=84903832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211183737.2A Pending CN115629964A (en) 2022-09-27 2022-09-27 Access method, apparatus, device, storage medium and computer program product

Country Status (1)

Country Link
CN (1) CN115629964A (en)

Similar Documents

Publication Publication Date Title
CN108683562B (en) Anomaly detection positioning method and device, computer equipment and storage medium
US20180267885A1 (en) Determining application test results using screenshot metadata
CN110225104B (en) Data acquisition method and device and terminal equipment
CN110474900B (en) Game protocol testing method and device
CN108111364B (en) Service system testing method and device
CN110244963B (en) Data updating method and device and terminal equipment
US10129278B2 (en) Detecting malware in content items
CN114253864A (en) Service testing method and device, electronic equipment and storage medium
CN112671609A (en) Asset census and safety detection method and device and terminal equipment
CN109408361A (en) Monkey tests restored method, device, electronic equipment and computer readable storage medium
CN112948224A (en) Data processing method, device, terminal and storage medium
CN112667638B (en) Dynamic report generation method and device, terminal equipment and readable storage medium
CN114139161A (en) Method, device, electronic equipment and medium for batch vulnerability detection
CN113132522A (en) Test method, device, server and medium
CN108228611B (en) Document information copying method and device
CN112561690A (en) Method, system, equipment and storage medium for testing credit card staging service interface
CN115022201B (en) Data processing function test method, device, equipment and storage medium
US10242315B2 (en) Finite state machine forming
CN115629964A (en) Access method, apparatus, device, storage medium and computer program product
CN115827122A (en) Operation guiding method and device, electronic equipment and storage medium
CN115600213A (en) Vulnerability management method, device, medium and equipment based on application program
CN111367898A (en) Data processing method, device, system, electronic equipment and storage medium
CN111949510B (en) Test processing method, device, electronic equipment and readable storage medium
CN111045983A (en) Nuclear power station electronic file management method and device, terminal equipment and medium
CN111290870A (en) Method and device for detecting abnormity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination