CN116361145A - Application access detection and processing method, device and medium - Google Patents

Application access detection and processing method, device and medium Download PDF

Info

Publication number
CN116361145A
CN116361145A CN202211627466.5A CN202211627466A CN116361145A CN 116361145 A CN116361145 A CN 116361145A CN 202211627466 A CN202211627466 A CN 202211627466A CN 116361145 A CN116361145 A CN 116361145A
Authority
CN
China
Prior art keywords
access
application
information
software development
development kit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211627466.5A
Other languages
Chinese (zh)
Inventor
高英虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuanjingshengsheng Beijing Technology Co ltd
Original Assignee
Yuanjingshengsheng Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuanjingshengsheng Beijing Technology Co ltd filed Critical Yuanjingshengsheng Beijing Technology Co ltd
Priority to CN202211627466.5A priority Critical patent/CN116361145A/en
Publication of CN116361145A publication Critical patent/CN116361145A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the application provides an application access detection and processing method, equipment and medium. The method comprises the following steps: providing an application detection script, wherein element information of application elements to be accessed is defined in the application detection script; detecting a software development kit of the cloud application by adopting the application detection script, and determining access information of each application element in the software development kit; detecting the access completion degree according to the element information and the access information; and generating an access report according to the access completion degree, and feeding back the access report. The access condition of the SDK can be detected and fed back quickly, so that manual intervention is not needed, and the access efficiency of the SDK is improved.

Description

Application access detection and processing method, device and medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an application access detection method, an application access processing method, an electronic device, and a storage medium.
Background
The cloud application is a new application form generated based on cloud computing, and is a new application which is installed on the cloud end, processes such as application logic, operation tasks and the like of the application are executed on the cloud end, and video generated by an application interface is fed back to a client. It puts all the processing of the application in the cloud, but is not perceived by the user. Taking a cloud game as an example, the cloud game is a game mode based on cloud computing, and in a running mode of the cloud game, all games run at a server side, and after rendered game pictures are compressed and then transmitted to a user through a network.
The application developer may access to the cloud server after developing a software development kit (Software Development Kit, SDK) for the cloud application. However, the cloud service end generally only provides development documents for application developers, if the application developers have unclear places, if some methods are not accessed, the cloud application installation is problematic, manual customer service intervention is needed to cooperate with the access of the SDK, more manpower resources are needed to be consumed, and the efficiency is low.
Disclosure of Invention
The embodiment of the application access detection method improves the access efficiency of cloud applications.
Correspondingly, the embodiment of the application also provides an application processing detection method, electronic equipment and a storage medium, which are used for guaranteeing the implementation and application of the system.
In order to solve the above problems, an embodiment of the present application discloses an application access detection method, which includes:
providing an application detection script, wherein element information of application elements to be accessed is defined in the application detection script;
detecting a software development kit of the cloud application by adopting the application detection script, and determining access information of each application element in the software development kit;
Detecting the access completion degree according to the element information and the access information;
and generating an access report according to the access completion degree, and feeding back the access report.
Optionally, the application element includes: a method element and an event code, the method element comprising: access methods and method parameters; the element information includes: the number of methods of the access method, the number of parameters of the method parameters and the number of event codes of the event codes.
Optionally, the detecting the software development kit of the cloud application by using the application detection script, determining access information of each application element in the software development kit, includes:
and adopting the application detection script to scan a software development kit of the cloud application, and determining first access information of the scanned method elements and second access information of the event codes.
Optionally, the software development kit for scanning the cloud application by using the application detection script determines first access information of the scanned method element, including:
adopting the application detection script to scan a software development kit of the cloud application, and recording the scanned access methods and the first number of the scanned access methods;
and recording the method parameters corresponding to the scanned access method and the second quantity of the method parameters.
Optionally, the software development kit for scanning the cloud application by using the application detection script determines first access information of the scanned method element and second access information of the event code, including:
and adopting the software development kit of the application detection script scanning cloud application to record the scanned event codes and the third number of the scanned event codes.
Optionally, the detecting the access completion according to the element information and the access information includes:
calculating a first completion degree of the method element and a second completion degree of the event code according to the element information and the access information;
and calculating the access completion degree corresponding to the software development kit according to the first completion degree and the second completion degree.
Optionally, the calculating the first completion degree of the method element and the second completion degree of the event code according to the element information and the access information includes:
acquiring the number of methods of an access method and the number of parameters of method parameters from the element information, and calculating the first completion degree of the method elements by adopting the first number, the number of methods, the second number and the number of parameters; and
and acquiring the number of the event codes from the element information, and calculating the second completion degree of the event codes by adopting the third number and the number of the event codes.
Optionally, the generating an access report according to the access completion degree includes:
and determining an unaccessed application element according to the access completion degree, and generating an access report based on the unaccessed application element.
The embodiment of the application also discloses an application access processing method, which comprises the following steps:
setting application elements to be accessed in a software development kit and element information of the application elements;
and generating an application detection script according to the application elements and the element information, wherein the application detection script is used for detecting an application software development kit, determining access information of each application element in the software development kit, detecting access completion degree according to the element information and the access information, and generating an access report and feeding back according to the access completion degree.
Optionally, the setting the application element to be accessed in the software development kit and the element information of the application element includes at least one of the following steps:
determining a method element to be accessed in a software development kit and first element information of the method element, and configuring the method element and the first element information in a configuration file, wherein the method element comprises the following steps: access methods and method parameters; the first element information includes: the number of methods of the access method, the number of parameters of the method parameters;
Determining event codes to be accessed in a software development kit and the number of the event codes, and configuring the event codes and the number of the event codes in a configuration file.
Optionally, the generating an application detection script according to the application element and the element information includes:
and performing script configuration according to the configuration file to generate a corresponding application detection script.
The embodiment of the application also discloses electronic equipment, which comprises: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes the computer-executable instructions stored by the memory to implement the methods as described in embodiments of the present application.
The embodiment of the application also discloses a computer readable storage medium, wherein computer executable instructions are stored in the computer readable storage medium, and the computer executable instructions are used for realizing the method according to the embodiment of the application when being executed by a processor.
Compared with the prior art, the embodiment of the application has the following advantages:
in the embodiment of the application detection script is provided, element information of application elements to be accessed is defined in the application detection script, then the application detection script can be used for detecting a software development kit of cloud application, and access information of each application element in the software development kit is determined, so that access conditions of the application elements in the SDK are scanned, access completion degrees are detected according to the element information and the access information, an access report is generated according to the access completion degrees, the access report is fed back, the access conditions of the SDK can be rapidly detected and fed back, manual intervention is not needed, and the access efficiency of the SDK is improved.
Drawings
FIG. 1 is a flow chart of steps of an embodiment of an application access processing method of the present application;
FIG. 2 is a flow chart of steps of an embodiment of an application access detection method of the present application;
FIG. 3 is a flow chart of steps of another embodiment of an application access detection method of the present application;
FIG. 4A is a schematic diagram of an example of access processing for a cloud game according to an embodiment of the present application;
FIG. 4B is a flowchart illustrating steps of an embodiment of a cloud game access detection method according to the present application;
FIG. 5A is a schematic diagram of an example of access processing for another cloud game according to an embodiment of the present application;
FIG. 5B is a flowchart illustrating steps of another embodiment of a cloud game access detection method of the present application;
fig. 6 is a schematic structural diagram of an exemplary apparatus provided in one embodiment of the present application.
Detailed Description
In order that the above-recited objects, features and advantages of the present application will become more readily apparent, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings.
The cloud application method and device can be applied to cloud application scenes, such as cloud game software, cloud office software, cloud navigation software, cloud music software and the like. The cloud application is a new application form generated based on cloud computing, and is a new application which is installed on the cloud end, processes application logic, operation tasks and the like of the application are executed on the cloud end, and video generated by an application interface is fed back to a client.
According to the cloud application detection method and device, various application elements which are required to be accessed by the cloud application can be predefined, and the application detection script is generated, so that the SDK of the cloud application developed by an application developer is detected through the application detection script, the application elements which are not accessed are determined and prompted, and the access by division is avoided, and the access is improved.
Referring to fig. 1, a flowchart illustrating steps of an embodiment of an application access processing method of the present application is shown.
Step 102, setting application elements to be accessed in a software development kit and element information of the application elements.
The application elements to be accessed and the element information of each application element when the SDK accesses the cloud server can be predefined. For example, the development document may be analyzed to determine the application elements to be accessed and the element information of each application element, and access configuration information may be predefined, for example, to determine the application elements to be accessed and the element information of each application element through the access configuration information.
The application element is an element to be accessed in the SDK, and the application element comprises: a method element and an event code, the method element being an element related to an access method, the method element comprising: access method and method parameters. The access method refers to various methods for accessing the cloud service end and services thereof, such as an access method of an interface of the cloud service end. The method parameters refer to parameters that need to be transferred in the access method. The event code refers to an identification code of an event required to be called by the access cloud server, and the event accessed to the cloud server is an operation event, a calling event and the like. The element information includes: the number of methods of the access method, the number of parameters of the method parameters and the number of event codes of the event codes. Optionally, the setting the application element to be accessed in the software development kit and the element information of the application element includes: determining a method element to be accessed in a software development kit and first element information of the method element, and configuring the method element and the first element information in a configuration file, wherein the method element comprises the following steps: access methods and method parameters; the first element information includes: the number of methods of the access method, the number of parameters of the method parameters; determining event codes to be accessed in a software development kit and the number of the event codes, and configuring the event codes and the number of the event codes in a configuration file.
The method comprises the steps of analyzing files related to access, such as development files, determining method elements to be accessed in a software development kit and first element information of the method elements, determining access methods needed in SDK access, and the number of the access methods N1, wherein parameters needed to be transferred in each method, and the number of parameters needed to be transferred in the ith method is Pi. Wherein N1, pi, etc. may be set based on actual requirements, which is not limited in the embodiments of the present application. And adding the method element and the first element information into a configuration file of the application script. And the event codes to be accessed in the software development kit and the number of the event codes can be determined through analysis, for example, the event codes to be docked in the SDK access and the number of the event codes N2 are determined. Wherein, N2, etc. can be set based on actual requirements, which is not limited in the embodiments of the present application. And adding the event codes and the number of the event codes into the configuration file, and then configuring the detection script based on the configuration file to generate a corresponding application detection script. Because the access method and the event code are both needed to be docked, the weight of the access method and the event code is the same, or the weight is not set.
And 104, generating an application detection script according to the application element and the element information.
After the configuration of application elements such as method elements, event codes and the like and element information is completed, script configuration can be performed according to the configuration file, and a corresponding application detection script is generated. The detection script is used for performing access detection on the SDK.
For example, setting detection logic and detection step of the SDK, and adding corresponding application elements and element information to be detected in the detection step. The method for detecting the access completion degree of the SDK can be further arranged subsequently, so that the access completion degree is determined according to the detected result of the application element and the element information, and the unaccessed application element can be reminded, so that the SDK can be accessed more accurately.
The application detection script can detect the software development kit of the application, determine the access information of each application element in the software development kit, detect the access completion degree according to the element information and the access information, and generate an access report and feed back according to the access completion degree.
On the basis of the embodiment, the embodiment of the application also provides an application access detection method, which can carry out access detection on the SDK based on the detection script, thereby rapidly positioning the elements which are not accessed and improving the access efficiency.
Referring to fig. 1, a flowchart illustrating steps of an embodiment of an application access detection method of the present application is shown.
Step 202, providing an application detection script, wherein element information of application elements to be accessed is defined in the application detection script.
After the application detection script is generated, the application detection script may be provided to detect the SDK of the cloud application. In the embodiment of the application, the application detection script can detect the SDK under various conditions. In one example, the application detection script may be sent to a server device of an application developer, so that the application developer may autonomously detect the SDK through the application detection script after the development of the SDK is completed. In other examples, after the application developer completes the development of the SDK, the application developer may upload the SDK to the cloud server for access, so as to be able to install the SDK, provide the function of the cloud application, and after receiving the SDK uploaded by the application developer, detect the SDK by using an application detection script.
And 204, detecting a software development kit of the cloud application by using the application detection script, and determining access information of each application element in the software development kit.
After the SDK and the application detection script are acquired, the application detection script can be adopted to detect the SDK of the cloud application, the SDK can be scanned to determine application elements used by the SDK, and access information of each application element is obtained, such as which application elements are accessed and which application elements are not accessed.
In an optional embodiment, the detecting the software development kit of the cloud application by using the application detection script, and determining access information of each application element in the software development kit includes: and adopting the application detection script to scan a software development kit of the cloud application, and determining first access information of the scanned method elements and second access information of the event codes. The application detection script is a code scanning tool, can scan codes of the SDK, detects accessed method elements, namely an access method and method parameters, and first access information corresponding to the method elements based on code logic, and can also detect information such as accessed event codes, event code quantity and the like to generate access information of the software development kit.
The software development kit for scanning cloud applications by using the application detection script determines first access information of scanned method elements, including: adopting the application detection script to scan a software development kit of the cloud application, and recording the scanned access methods and the first number of the scanned access methods; and recording the method parameters corresponding to the scanned access method and the second quantity of the method parameters. The software development kit for scanning cloud applications by using the application detection script determines first access information of scanned method elements and second access information of event codes, and comprises the following steps: and adopting the software development kit of the application detection script scanning cloud application to record the scanned event codes and the third number of the scanned event codes. And scanning the SDK by using the application detection script, if the application element is obtained by scanning, detecting whether the application element is the application element which is defined in the application detection script and needs to be accessed, and if the application element is the application element which needs to be accessed, recording in the access information. If a method is detected to be called, whether the method is an access method required by definition can be judged, if the method is the access method, whether the access method is accessed is judged, if the method is not recorded, the name or the identification of the access method is recorded, and in the first quantity c1 of the access methods, the recording is not needed, and if the method is recorded, the counting is not needed. For a scanned access method, method parameters of the access method are detected, names or identifications of the method parameters, etc. are recorded, and +1 is in a second number pi of the method parameters. If the event code of the calling event is detected, it can be determined whether the event code is recorded, if not, the event code is recorded, and in the third number c2 of event codes +1, if recorded, the recording is not required, and if not, the counting is not required. The first quantity c1 is less than or equal to the method quantity N1, the second quantity Pi is less than or equal to the parameter quantity Pi, the third quantity c2 is less than or equal to the event code quantity N2, and the positive integers are c1, N1, pi, pi, c2 and N2.
In one example, the application detection script may correspond to several counters, such as a method counter, a parameter counter, and an event counter, respectively. In the scanning process, each time an access method is detected, the access method is recorded, and if the access method is the recorded access method, the access method is not required to be repeatedly recorded or repeatedly counted in a method counter of +1. Similarly, every time a method parameter of an access method is detected, the access method is recorded, and if the method parameter is the recorded method parameter, the recording is not needed to be repeated, and the counting is not needed to be repeated in the parameter counter +1. Every time an event code is detected, the event code is recorded, and +1 is in the event counter, if the event code is already recorded, the event code does not need to be repeatedly recorded, and the event code does not need to be repeatedly counted.
In the embodiment of the application detection script, a scanning log can be generated in the scanning process, and application elements such as an access method, an event code, method parameters of the access method and the like which are already accessed, and the number of corresponding application elements of various types are recorded in the scanning log. The recorded access information therefore includes: the method comprises the steps of accessing an access method and a first quantity thereof, accessing method parameters in each access method, and a second quantity of the method parameters, and accessing an event code and a third quantity of the event code.
And step 206, detecting the access completion degree according to the element information and the access information.
The application detection script can also match element information defined in the script, namely element information required to be accessed by the cloud service end, with access information of application elements scanned in the SDK to determine the access completion degree of the SDK to the application elements required to be accessed, so that a developer is assisted to quickly know the access condition. The access completion degree refers to the completion degree of the SDK accessing the cloud server, and in this embodiment, the element information of the application element defined in the application detection script is used as a benchmark, and all the element information of the application element completes the access as 100% of completion.
In an optional embodiment, the detecting the access completion according to the element information and the access information includes: calculating a first completion degree of the method element and a second completion degree of the event code according to the element information and the access information; and calculating the access completion degree corresponding to the software development kit according to the first completion degree and the second completion degree. The completion of the method elements and the event codes can be calculated respectively, so that the access completion of the SDK overall is obtained. Wherein the first degree of completion of the method element may be calculated based on the first access information and the element information of the method element. And calculating a second completion of the event code based on the second access information and the element information of the event code. And then adding and summing the first completion degree and the second completion degree to obtain the SDK access completion degree.
The calculating the first completion degree of the method element and the second completion degree of the event code according to the element information and the access information comprises the following steps: acquiring the number of methods of an access method and the number of parameters of method parameters from the element information, and calculating the first completion degree of the method elements by adopting the first number, the number of methods, the second number and the number of parameters; and obtaining the number of the event codes from the element information, and calculating the second completion degree of the event codes by adopting the third number and the number of the event codes. The first number of access methods and the second number of method parameters may be obtained from the first access information, the method number of access methods, the parameter number of method parameters, and the event code number of event codes may be obtained from the element information, the first completion degree of the access methods may be determined based on the first number, the method number, the second number, the parameter number, and the event code number, and may be calculated by the following formula:
Figure BDA0004004096380000071
the value range of the first quantity c1 is i epsilon [1, N1], the second quantity is Pi, the method quantity is N1, the parameter quantity is Pi, and the event code quantity is N2.
The third number of event codes may be obtained from the second access information, the number of event codes of the event codes may be obtained from the element information, the second degree of completion of the event codes may be determined based on the third number and the number of event codes, and may be calculated by the following formula:
Figure BDA0004004096380000072
Wherein the third number is c2.
The access completion of the SDK may then be determined based on the first completion and the second completion, and may be calculated by the following formula:
Figure BDA0004004096380000073
the access completion of the SDK is calculated, e.g., 100% complete, 95% complete, etc.
And step 208, generating an access report according to the access completion degree, and feeding back the access report.
An access report may be generated based on the completion, for example, the access completion is 100%, then a 100% complete (i.e., complete) access report may be generated, if the completion is 95%, then a 95% complete access report may be generated, and for the case of not 100% complete, i.e., not complete, application elements such as a non-accessed access method, method parameters, and/or event code may be determined and added to the access report for feedback, so as to prompt an application developer, and the application developer determines whether access is needed.
In an optional embodiment, the generating an access report according to the access completion degree includes: and determining an unaccessed application element according to the access completion degree, and generating an access report based on the unaccessed application element. For the non-fully accessed SDK, the non-accessed application element may be determined, for example, based on the non-accessed application element of the scan log, and for example, the access method, method parameter and event code recorded in the scan log are compared with the access method, method parameter and event code required to be accessed in the application element applying the scan script, the non-accessed application element such as the non-accessed access method, method parameter and/or event code is determined, then an access report may be generated based on the access completion and the non-accessed application element, to prompt the application developer of the non-accessed application element, and to determine whether the SDK needs to be updated to access the required application element.
In the embodiment of the present application, the application element is an element that needs to be accessed by accessing the cloud service end and using the service in the cloud service end, so that the application element that accesses the cloud service end is usually needed to be accessed, and if the service of some cloud service ends is not needed, the service of the cloud service end may not be accessed, so that the access completion degree of the SDK is not required to be 100%. The access report also alerts the application developer to determine if certain non-accessed application elements need access. It may also be noted that, if some application elements are all SDKs that need to be accessed, or if an SDK with some components needs to be accessed, then a prompt may be emphasized in the access report, such as a rendering method that must be accessed for the interface of the cloud application, and if not accessed, a prompt is needed.
In summary, an application detection script is provided, element information of application elements to be accessed is defined in the application detection script, then the application detection script can be used for detecting a software development kit of a cloud application, and access information of each application element in the software development kit is determined, so that access conditions of the application elements in an SDK are scanned, an access report is generated according to the element information and the access information detection completion degree and the access completion degree, the access report is fed back, the access conditions of the SDK can be rapidly detected and fed back, manual intervention is not needed, and the access efficiency of the SDK is improved.
On the basis of the embodiment, the embodiment of the application also provides an application access detection method, which can provide an application detection script for a service end of an application developer, so that the application developer can detect the SDK developed by the application developer, and upload the SDK to the cloud service end after confirming the SDK without errors.
In other embodiments, the development of the SDK can be completed in the application developer, and the SDK is uploaded to the cloud server for access, so that in the process of providing the application service later, the application detection script can be used for detecting the uploaded SDK, and an access report is provided to the server of the application developer, so as to confirm whether the SDK needs to be updated.
The following embodiments take a cloud server as an example of providing an application detection script to a server of an application developer.
Referring to fig. 3, a flowchart of steps of another embodiment of an application access detection method of the present application is shown.
In step 302, an application detection script is received, where element information of an application element to be accessed is defined in the application detection script.
The application elements include: a method element and an event code, the method element comprising: access methods and method parameters; the element information includes: the number of methods of the access method, the number of parameters of the method parameters and the number of event codes of the event codes.
Taking the cloud game as an example, a server side of a developer of the cloud game can receive an application detection script, and after the developer completes development of the SDK of the cloud game, the application detection script can be used for detecting the SDK of the cloud game, and the following detection process is executed.
And step 304, scanning a software development kit of the cloud application by adopting the application detection script.
Step 306, first access information of the scanned method element is determined.
The software development kit adopting the application detection script to scan the cloud application determines first access information of the scanned method element, and the method comprises the following steps: adopting the application detection script to scan a software development kit of the cloud application, and recording the scanned access methods and the first number of the scanned access methods; and recording the method parameters corresponding to the scanned access method and the second quantity of the method parameters.
Step 308, determining second access information of the scanned event code.
The software development kit for scanning cloud applications by using the application detection script, determining second access information of the scanned event code, includes: and adopting the software development kit of the application detection script scanning cloud application to record the scanned event codes and the third number of the scanned event codes.
Step 310, calculating the first completion of the method element and the second completion of the event code according to the element information and the access information.
The calculating the first completion degree of the method element and the second completion degree of the event code according to the element information and the access information comprises the following steps: acquiring the number of methods of an access method and the number of parameters of method parameters from the element information, and calculating the first completion degree of the method elements by adopting the first number, the number of methods, the second number and the number of parameters; and acquiring the number of event codes of the event codes from the element information, and calculating the second completion degree of the event codes by adopting the third number and the number of event codes.
Step 312, determining the access completion degree corresponding to the software development kit based on the first completion degree and the second completion degree.
And step 314, generating an access report according to the access completion degree, and outputting the access report.
And determining an unaccessed application element according to the access completion degree, and generating an access report based on the unaccessed application element.
Taking a development scenario applied to a cloud game as an example, on the basis of the above embodiment, as shown in fig. 4A: the cloud service end provides the service of the cloud application, so that a game developer can access the developed cloud games to the website of the cloud service end, and provide the service of the cloud games for users. For example, the cloud server may develop application detection scripts to provide to various application developers who need to access the cloud server. The game developer server of the cloud game receives the application detection script from the cloud server. And then the SDK of the cloud game to be accessed to the cloud server can be detected by adopting the game detection script. The following steps of fig. 4B may be performed:
Step 402, receiving an application detection script, wherein element information of an application element to be accessed is defined in the application detection script.
Wherein the application detection script may define application elements, i.e. element information, required for access to the cloud game. For example, a method for calling various interfaces of the cloud service end, a method for calling services required by the cloud game, and the like. And event codes of various events corresponding to the cloud game, such as rendering events, game response events and the like.
Step 404, scanning the SDK of the cloud game by using the application detection script.
Step 406, record the scanned access method and the first number of scanned access methods.
Step 408, recording the method parameters corresponding to the scanned access method and the second number of method parameters.
Step 410, record the scanned event codes, and a third number of scanned event codes.
Step 412, obtaining the number of methods and the number of parameters of the method parameters of the access method from the element information, and calculating the first completion degree of the method element by using the first number, the number of methods, the second number and the number of parameters.
Step 414, obtaining the number of event codes of the event codes from the element information, and calculating the second completion degree of the event codes by using the third number and the number of event codes.
And step 416, determining the access completion degree corresponding to the SDK based on the first completion degree and the second completion degree.
And 418, generating an access report according to the access completion degree.
And judging whether the access completion degree is 100 percent or not. I.e. judging whether the access completion is complete. If yes, directly generating an access report. If not, determining the unaccessed application element according to the access completion degree, and generating an access report based on the unaccessed application element.
Based on the access report, a developer of the cloud game can determine whether the SDK of the cloud game is completely accessed, if the SDK is not completely accessed, the developer can check unaccessed application elements, determine whether the SDK needs to be defined in the SDK for access, and if the SDK needs to be updated. If not, the SDK of the cloud game can be uploaded to the cloud service end so as to deploy the cloud game.
Therefore, before the server is uploaded, the SDK of the meta-game can be automatically detected based on the application detection script, and unaccessed application elements are repaired, so that the subsequent access process of the SDK of the cloud game can be rapidly completed, manual access is not needed, and the access efficiency is improved.
Based on the above embodiments, the embodiments of the present application further provide an application access detection method, as in fig. 5A, capable of completing development of an SDK of a cloud game in a game developer, uploading the SDK of the cloud game to a cloud service end for access, so that in a process of subsequently providing an application service, an application detection script may be used to detect the uploaded SDK, and provide an access report to the service end of the application developer, so as to confirm whether the SDK needs to be updated. The cloud service end can provide management and control service for the cloud game, provides a service node of a container mass of the cloud game, and serves cloud game and cloud hand game for one-stop cloud game of the whole cloud game scene. And selecting a proper running instance to run the cloud game according to the adapting result, and developing the required cloud game by utilizing the SDK.
Referring to fig. 5B, a flowchart of steps of another embodiment of a cloud game access detection method of the present application is shown.
Step 502, providing an application detection script, wherein element information of an application element to be accessed is defined in the application detection script.
Step 504, receiving the SDK of the cloud game.
Wherein the application detection script may define application elements, i.e. element information, required for access to the cloud game. For example, a method for calling various interfaces of the cloud service end, a method for calling services required by the cloud game, and the like. And event codes of various events corresponding to the cloud game, such as rendering events, game response events and the like.
And step 506, scanning the SDK of the cloud game by using the application detection script.
Then, the accessed method elements, the accessed method element information, the event codes and the event code information can be determined, and the access information of the software development kit is generated.
Step 508, the scanned access method and the first number of scanned access methods are recorded.
Step 510, recording the method parameters corresponding to the scanned access method and the second number of the method parameters.
Step 512 records the scanned event codes, and a third number of scanned event codes.
Step 514, obtaining the number of methods and the number of parameters of the method parameters of the access method from the element information, and calculating the first completion degree of the method element by using the first number, the number of methods, the second number and the number of parameters.
And step 516, obtaining the number of event codes of the event codes from the element information, and calculating the second completion degree of the event codes by adopting the third number and the number of event codes.
And step 518, determining the access completion degree corresponding to the SDK based on the first completion degree and the second completion degree.
Step 520, determining whether the access completion is 100%. I.e. judging whether the access completion is complete.
If yes, go to step 524, if no, go to step 522.
And 522, determining non-accessed application elements according to the access completion degree.
At step 524, an access report is generated.
And step 526, feeding back the access report.
Therefore, after the server side is uploaded, the SDK of the cloud game is detected based on the application detection script, an application developer is prompted for repairing the unaccessed application elements, and after the application developer confirms that the SDK is correct, the access process can be executed, and as the detection is completed, the access can be completed quickly, manual intervention is not needed, and the access efficiency is improved.
According to the cloud application testing method and device, a cloud application traditional access mode can be broken through, an efficiency improving tool, namely an application testing script, is designed and developed, a client access process is toolized, efficiency is improved, and manpower is liberated.
It should be noted that, in the embodiments of the present application, the use of user data may be involved, and in practical applications, user specific personal data may be used in the schemes described herein within the scope allowed by applicable legal regulations in the country where the applicable legal regulations are met (for example, the user explicitly agrees to the user to actually notify the user, etc.).
It should be noted that, for simplicity of description, the method embodiments are shown as a series of acts, but it should be understood by those skilled in the art that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently in accordance with the embodiments. Further, those skilled in the art will appreciate that the embodiments described in the specification are all preferred embodiments and that the acts referred to are not necessarily required by the embodiments of the present application.
On the basis of the above embodiment, this embodiment further provides an application access detection apparatus, which is applied to electronic devices such as a client device and a server device, where the apparatus includes:
The script providing module is used for providing an application detection script, wherein element information of application elements to be accessed is defined in the application detection script;
the detection module is used for detecting a software development kit of the cloud application by adopting the application detection script and determining access information of each application element in the software development kit;
the completion degree determining module is used for detecting the access completion degree according to the element information and the access information;
and the reporting module is used for generating an access report according to the access completion degree and feeding back the access report.
In summary, an application detection script is provided, element information of application elements to be accessed is defined in the application detection script, then the application detection script can be used for detecting a software development kit of cloud application, and access information of each application element in the software development kit is determined, so that access conditions of the application elements in an SDK are scanned, an access report is generated according to the element information and the access information detection completion degree and the access completion degree, the access report is fed back, the access conditions of the SDK can be rapidly detected and fed back, manual intervention is not needed, and the access efficiency of the SDK is improved.
Wherein the application element includes: a method element and an event code, the method element comprising: access methods and method parameters; the element information includes: the number of methods of the access method, the number of parameters of the method parameters and the number of event codes of the event codes.
The detection module is used for adopting the application detection script to scan a software development kit of the cloud application and determining first access information of the scanned method elements and second access information of the event codes.
The detection module is used for adopting the application detection script to scan a software development kit of the cloud application and recording the scanned access methods and the first number of the scanned access methods; and recording the method parameters corresponding to the scanned access method and the second quantity of the method parameters.
The detection module is used for adopting the application detection script to scan the software development kit of the cloud application, recording the scanned event codes and the third number of the scanned event codes.
The completion degree determining module is used for calculating the first completion degree of the method element and the second completion degree of the event code according to the element information and the access information; and calculating the access completion degree corresponding to the software development kit according to the first completion degree and the second completion degree.
The completion degree determining module is used for acquiring the number of methods of the access method and the number of parameters of the method parameters from the element information, and calculating the first completion degree of the method elements by adopting the first number, the number of methods, the second number and the number of parameters; and obtaining the number of the event codes from the element information, and calculating the second completion degree of the event codes by adopting the third number and the number of the event codes.
And the reporting module is used for determining an unaccessed application element according to the access completion degree and generating an access report based on the unaccessed application element.
On the basis of the above embodiment, the embodiment of the present application further provides an application access processing apparatus, which is applied to electronic devices such as a client device and a server device, where the apparatus includes:
the element setting module is used for setting application elements to be accessed in the software development kit and element information of the application elements;
the script generation module is used for generating an application detection script according to the application elements and the element information, wherein the application detection script is used for detecting an application software development kit, determining access information of each application element in the software development kit, detecting access completion degree according to the element information and the access information, and generating an access report and feeding back according to the access completion degree.
The element setting module is configured to determine a method element to be accessed in a software development kit and first element information of the method element, and configure the method element and the first element information in a configuration file, where the method element includes: access methods and method parameters; the first element information includes: the number of methods of the access method, the number of parameters of the method parameters; determining event codes to be accessed in a software development kit and the number of the event codes, and configuring the event codes and the number of the event codes in a configuration file.
The script generation module is used for carrying out script configuration according to the configuration file and generating a corresponding application detection script.
According to the cloud application testing method and device, a cloud application traditional access mode can be broken through, an efficiency improving tool, namely an application testing script, is designed and developed, a client access process is toolized, efficiency is improved, and manpower is liberated.
The embodiment of the application also provides electronic equipment, which comprises: a processor, and a memory communicatively coupled to the processor; the memory stores computer-executable instructions; the processor executes the computer-executable instructions stored by the memory to implement the methods as described in embodiments of the present application.
Embodiments of the present application provide a computer-readable storage medium having stored therein computer-executable instructions that, when executed by a processor, are configured to implement a method as described in embodiments of the present application.
Embodiments of the present disclosure may be implemented as an apparatus for performing a desired configuration using any suitable hardware, firmware, software, or any combination thereof, which may include a server (cluster), terminal, or the like. Fig. 6 schematically illustrates an example apparatus 600 that may be used to implement various embodiments described herein.
For one embodiment, fig. 6 illustrates an example apparatus 600 having one or more processors 602, a control module (chipset) 604 coupled to at least one of the processor(s) 602, a memory 606 coupled to the control module 604, a non-volatile memory (NVM)/storage 608 coupled to the control module 604, one or more input/output devices 610 coupled to the control module 604, and a network interface 612 coupled to the control module 604.
The processor 602 may include one or more single-core or multi-core processors, and the processor 602 may include any combination of general-purpose or special-purpose processors (e.g., graphics processors, application processors, baseband processors, etc.). In some embodiments, the apparatus 600 can be used as a server, a terminal, or the like in the embodiments of the present application.
In some embodiments, the apparatus 600 can include one or more computer-readable media (e.g., memory 606 or NVM/storage 608) having instructions 614 and one or more processors 602 combined with the one or more computer-readable media configured to execute the instructions 614 to implement the modules to perform the actions described in this disclosure.
For one embodiment, the control module 604 may include any suitable interface controller to provide any suitable interface to at least one of the processor(s) 602 and/or any suitable device or component in communication with the control module 604.
The control module 604 may include a memory controller module to provide an interface to the memory 606. The memory controller modules may be hardware modules, software modules, and/or firmware modules.
Memory 606 may be used to load and store data and/or instructions 614 for device 600, for example. For one embodiment, memory 606 may comprise any suitable volatile memory, such as, for example, a suitable DRAM. In some embodiments, memory 606 may comprise double data rate type four synchronous dynamic random access memory (DDR 6 SDRAM).
For one embodiment, the control module 604 may include one or more input/output controllers to provide an interface to the NVM/storage 608 and the input/output device(s) 610.
For example, NVM/storage 608 may be used to store data and/or instructions 614. NVM/storage 608 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 608 may include a storage resource as part of a device on which apparatus 600 is installed, or it may be accessible by the device without necessarily being part of the device. For example, NVM/storage 608 may be accessed over a network via input/output device(s) 610.
Input/output device(s) 610 may provide an interface for apparatus 600 to communicate with any other suitable devices, input/output device 610 may include communication components, audio components, sensor components, and the like. The network interface 612 may provide an interface for the device 600 to communicate over one or more networks, and the device 600 may communicate wirelessly with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols, such as accessing a wireless network based on a communication standard, such as bluetooth, wiFi, 2G, 3G, 4G, 5G, etc., or a combination thereof.
For one embodiment, at least one of the processor(s) 602 may be packaged together with logic of one or more controllers (e.g., memory controller modules) of the control module 604. For one embodiment, at least one of the processor(s) 602 may be packaged together with logic of one or more controllers of the control module 604 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 602 may be integrated on the same die as logic of one or more controllers of the control module 604. For one embodiment, at least one of the processor(s) 602 may be integrated on the same die with logic of one or more controllers of the control module 604 to form a system on chip (SoC).
In various embodiments, the apparatus 600 may be, but is not limited to being: a server, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.), among other terminal devices. In various embodiments, the apparatus 600 may have more or fewer components and/or different architectures. For example, in some embodiments, the apparatus 600 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and a speaker.
The detection device can adopt a main control chip as a processor or a control module, sensor data, position information and the like are stored in a memory or an NVM/storage device, a sensor group can be used as an input/output device, and a communication interface can comprise a network interface.
The embodiment of the application also provides electronic equipment, which comprises: a processor; and a memory having executable code stored thereon that, when executed, causes the processor to perform a method as described in one or more of the embodiments herein. The memory in the embodiment of the application can store various data, such as various data including target files, file and application related data, and the like, and also can include user behavior data and the like, so as to provide a data base for various processes.
Embodiments also provide one or more machine-readable media having executable code stored thereon that, when executed, cause a processor to perform a method as described in one or more of the embodiments of the present application.
For the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described by differences from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present embodiments have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the present application.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or terminal device comprising the element.
The foregoing has described in detail a method for detecting access to applications, a method for processing access to applications, an electronic device and a storage medium, and specific examples have been used herein to illustrate the principles and embodiments of the present application, where the above description of the examples is only for aiding in understanding the method and core idea of the present application; meanwhile, as those skilled in the art will have modifications in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (13)

1. An application access detection method, the method comprising:
providing an application detection script, wherein element information of application elements to be accessed is defined in the application detection script;
detecting a software development kit of the cloud application by adopting the application detection script, and determining access information of each application element in the software development kit;
detecting the access completion degree according to the element information and the access information;
and generating an access report according to the access completion degree, and feeding back the access report.
2. The method of claim 1, wherein the application element comprises: a method element and an event code, the method element comprising: access methods and method parameters; the element information includes: the number of methods of the access method, the number of parameters of the method parameters and the number of event codes of the event codes.
3. The method of claim 2, wherein the detecting the software development kit of the cloud application using the application detection script, and determining the access information of each application element in the software development kit, comprises:
and adopting the application detection script to scan a software development kit of the cloud application, and determining first access information of the scanned method elements and second access information of the event codes.
4. The method of claim 3, wherein the scanning a software development kit of a cloud application using the application detection script to determine first access information for the scanned method element comprises:
adopting the application detection script to scan a software development kit of the cloud application, and recording the scanned access methods and the first number of the scanned access methods;
and recording the method parameters corresponding to the scanned access method and the second quantity of the method parameters.
5. The method of claim 4, wherein the software development kit for scanning cloud applications using the application detection script determines second access information for the scanned event code, comprising:
and adopting the software development kit of the application detection script scanning cloud application to record the scanned event codes and the third number of the scanned event codes.
6. The method of claim 5, wherein detecting the access completion based on the element information and the access information comprises:
calculating a first completion degree of the method element and a second completion degree of the event code according to the element information and the access information;
and calculating the access completion degree corresponding to the software development kit according to the first completion degree and the second completion degree.
7. The method of claim 6, wherein calculating a first completion of a method element and a second completion of an event code based on the element information and access information comprises:
acquiring the number of methods of an access method and the number of parameters of method parameters from the element information, and calculating the first completion degree of the method elements by adopting the first number, the number of methods, the second number and the number of parameters; and
and acquiring the number of the event codes from the element information, and calculating the second completion degree of the event codes by adopting the third number and the number of the event codes.
8. The method according to any of claims 1-7, wherein said generating an access report in accordance with said access completion comprises:
and determining an unaccessed application element according to the access completion degree, and generating an access report based on the unaccessed application element.
9. An application access processing method, the method comprising:
setting application elements to be accessed in a software development kit and element information of the application elements;
and generating an application detection script according to the application elements and the element information, wherein the application detection script is used for detecting an application software development kit, determining access information of each application element in the software development kit, detecting access completion degree according to the element information and the access information, and generating an access report and feeding back according to the access completion degree.
10. The method according to claim 9, wherein the setting the application element to be accessed in the software development kit and the element information of the application element includes at least one of the following steps:
determining a method element to be accessed in a software development kit and first element information of the method element, and configuring the method element and the first element information in a configuration file, wherein the method element comprises the following steps: access methods and method parameters; the first element information includes: the number of methods of the access method, the number of parameters of the method parameters;
determining event codes to be accessed in a software development kit and the number of the event codes, and configuring the event codes and the number of the event codes in a configuration file.
11. The method of claim 10, wherein generating an application detection script based on the application element and element information comprises:
and performing script configuration according to the configuration file to generate a corresponding application detection script.
12. An electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the method of any one of claims 1-11.
13. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are adapted to carry out the method of any one of claims 1-11.
CN202211627466.5A 2022-12-16 2022-12-16 Application access detection and processing method, device and medium Pending CN116361145A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211627466.5A CN116361145A (en) 2022-12-16 2022-12-16 Application access detection and processing method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211627466.5A CN116361145A (en) 2022-12-16 2022-12-16 Application access detection and processing method, device and medium

Publications (1)

Publication Number Publication Date
CN116361145A true CN116361145A (en) 2023-06-30

Family

ID=86910092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211627466.5A Pending CN116361145A (en) 2022-12-16 2022-12-16 Application access detection and processing method, device and medium

Country Status (1)

Country Link
CN (1) CN116361145A (en)

Similar Documents

Publication Publication Date Title
CN107122301B (en) Interface testing method and device
CN109299015B (en) Software testing method, device and system
US9665465B1 (en) Automated determination of application permissions
CN110874315B (en) Test method, test device, electronic equipment and storage medium
WO2015131804A1 (en) Call stack relationship acquiring method and apparatus
CN109344066B (en) Method, system and terminal for testing browser page
CN112346965B (en) Test case distribution method, device and storage medium
CN111625443B (en) Pressure testing method, device, equipment and storage medium
CN114911706A (en) Use case recommendation method, device, equipment and storage medium
US11715496B2 (en) Systems and methods for processing video data
CN108268369B (en) Test data acquisition method and device
CN111866129B (en) Method, device and medium for determining service availability index based on cloud platform
CN110569046B (en) Data processing method, device, equipment and storage medium
CN113869989B (en) Information processing method and device
CN116361145A (en) Application access detection and processing method, device and medium
CN114153512A (en) Resource loading method and device, electronic equipment and storage medium
CN113176952A (en) Data processing method and device and readable storage medium
CN112416735A (en) Application program detection method and device, terminal equipment and storage medium
CN111026466A (en) File processing method and device, computer readable storage medium and electronic equipment
CN110781142A (en) Data import method and device, server and storage medium
CN110968817A (en) Page content detection method, device and system
CN111506320B (en) Installation method, installation configuration device and installation configuration equipment
CN113987417A (en) Data self-modification system and method and computer device
CN110471841B (en) Method, device, medium and electronic equipment for comparing drawing information
CN117252450A (en) Attribution method, attribution device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination