CN116594894A - Interface testing method and device, electronic equipment and storage medium - Google Patents

Interface testing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116594894A
CN116594894A CN202310587377.0A CN202310587377A CN116594894A CN 116594894 A CN116594894 A CN 116594894A CN 202310587377 A CN202310587377 A CN 202310587377A CN 116594894 A CN116594894 A CN 116594894A
Authority
CN
China
Prior art keywords
test
data
interface
encryption key
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310587377.0A
Other languages
Chinese (zh)
Inventor
钱太烈
刘泽
刘党敏
沈志为
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaovo Technology Co ltd
Original Assignee
Xiaovo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaovo Technology Co ltd filed Critical Xiaovo Technology Co ltd
Priority to CN202310587377.0A priority Critical patent/CN116594894A/en
Publication of CN116594894A publication Critical patent/CN116594894A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3696Methods or tools to render software testable
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses an interface testing method, an interface testing device, electronic equipment and a storage medium. The interface test method is executed by an interface test system, and the interface test system comprises a client and test services; the method comprises the following steps: the method comprises the steps that test data are obtained through a client, a test request is generated, and an encryption key matched with the test request is generated based on a dynamic encryption tool; encrypting the test data according to the encryption key through the client to obtain encrypted data, and sending the encrypted data and the test request to the test service; and carrying out interface test by using the encrypted data according to the test request through the test service. The technical scheme solves the problem of poor safety of test data transmission in the interface test process, and the key can be automatically generated and updated through the dynamic encryption tool, so that the safety and the integrity of the test data transmission are ensured.

Description

Interface testing method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of software testing technologies, and in particular, to an interface testing method, an apparatus, an electronic device, and a storage medium.
Background
With the development of modern internet applications, the security of test data is called one of the core problems in the software testing process.
At present, in the prior art, in the interface test process, a front end generally adopts an encryption algorithm to carry out static encryption on test data, and the test data is transmitted to a test service so as to ensure the safety of the test data. The encryption algorithm is a static and limited process in that once encrypted, the keys and algorithm are no longer changed. Thus, an attacker can easily obtain the key and thus pose a threat to the security and integrity of the test data.
Disclosure of Invention
The application provides an interface testing method, an interface testing device, electronic equipment and a storage medium, which are used for solving the problem of poor safety of test data transmission in the interface testing process, and automatically generating and updating a secret key through a dynamic encryption tool so as to ensure the safety and the integrity of the test data transmission.
According to an aspect of the present application, there is provided an interface test method, the method being performed by an interface test system comprising a client and a test service; the method comprises the following steps:
the method comprises the steps that test data are obtained through a client, a test request is generated, and an encryption key matched with the test request is generated based on a dynamic encryption tool;
encrypting the test data according to the encryption key through the client to obtain encrypted data, and sending the encrypted data and the test request to the test service;
and carrying out interface test by using the encrypted data according to the test request through the test service.
According to another aspect of the present application, there is provided an interface test apparatus configured to an interface test system including a client and a test service; the device comprises:
the encryption key generation module is used for acquiring test data through the client, generating a test request and generating an encryption key matched with the test request based on the dynamic encryption tool;
the encrypted data sending module is used for encrypting the test data according to the encryption key through the client to obtain encrypted data and sending the encrypted data and the test request to the test service;
and the interface test module is used for carrying out interface test by using the encrypted data according to the test request through the test service.
According to another aspect of the present application, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the interface test method of any one of the embodiments of the present application.
According to another aspect of the present application, there is provided a computer readable storage medium storing computer instructions for causing a processor to execute the interface test method according to any one of the embodiments of the present application.
According to the technical scheme, the client side obtains test data, a test request is generated, and an encryption key matched with the test request is generated based on a dynamic encryption tool; encrypting the test data according to the encryption key through the client to obtain encrypted data, and sending the encrypted data and the test request to the test service; and carrying out interface test by using the encrypted data according to the test request through the test service. The technical scheme solves the problem of poor safety of test data transmission in the interface test process, and the key can be automatically generated and updated through the dynamic encryption tool, so that the safety and the integrity of the test data transmission are ensured.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the application or to delineate the scope of the application. Other features of the present application will become apparent from the description that follows.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of an interface testing method according to a first embodiment of the present application;
FIG. 2 is a flow chart of an interface testing method according to a second embodiment of the present application;
fig. 3 is a schematic structural diagram of an interface testing device according to a third embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device implementing an interface testing method according to an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. The technical scheme of the application obtains, stores, uses, processes and the like the data, which all meet the relevant regulations of national laws and regulations.
Example 1
Fig. 1 is a flowchart of an interface testing method according to an embodiment of the present application, where the embodiment is applicable to a software testing scenario, and in particular, an interface testing scenario with a high requirement for confidentiality of test data. The method may be performed by an interface testing device, which may be implemented in hardware and/or software, which may be configured in an electronic apparatus. As shown in fig. 1, the method includes:
s110, test data are acquired through the client, a test request is generated, and an encryption key matched with the test request is generated based on the dynamic encryption tool.
The solution may be performed by an interface test system comprising a client and a test service. The interface test system may configure an interface test environment, such as a JMeter environment. The client can provide an operation interface for development, test and other personnel, and is used for submitting test data, editing the test data and other operations. Responding to the test data submitting operation of the client user, the interface test system can acquire the test data through the client, and generates a test request according to the test data, the test setting and other information. Meanwhile, a dynamic encryption tool configured in the interface test environment can generate an encryption key according to the test request.
In this solution, optionally, the generating, based on the dynamic encryption tool, an encryption key matched with the test request includes:
based on the dynamic encryption tool, an encryption algorithm is determined according to a preset dynamic selection rule, and an encryption key is generated according to the encryption algorithm.
The dynamic encryption tool may store various types of encryption algorithms in advance in an encryption algorithm database, and may include, for example, SHA-256, AES, etc. encryption algorithms. When the encryption key is required to be generated, an encryption algorithm is selected from the encryption algorithm database according to a preset dynamic selection rule, so that the encryption key is generated according to the encryption algorithm. Specifically, the dynamic selection rule may be algorithm selection performed in a certain random manner.
The encryption key generated by the dynamic encryption tool can improve the security of the encryption key, thereby ensuring the transmission reliability of the test data.
In one possible implementation, the encryption key is generated by hashing based on an encryption algorithm based on a dynamic salt and a static salt.
The encryption key may be generated using dynamic and static salts to increase the complexity of the password. Based on the encryption algorithm, the client can hash the encryption key generated by the dynamic salt and the static salt to increase the security of the encryption key.
In a preferred embodiment, the dynamic encryption tool is a dynamic encryption plug-in written based on Java language, which is integrated in the JFET environment.
The dynamic encryption tool can be a JMeter plug-in based on Java language, and the dynamic encryption tool can be integrated in a JMeter environment. The JMeter is an open-source pressure testing tool, supports multiple simulation protocols and data transmission modes, and can perform efficient data simulation and pressure testing.
According to the scheme, the dynamic encryption tool is integrated in the JMeter environment, and the encryption, decryption and transmission processes of data are realized through the dynamic encryption tool, so that the safety and the integrity of test data can be ensured.
S120, encrypting the test data according to the encryption key through the client to obtain encrypted data, and sending the encrypted data and the test request to the test service.
After obtaining the encryption key, the client may encrypt the test data with the encryption key to obtain encrypted data. After obtaining the encrypted data, the client may send the encrypted data and the test request to the test service. It should be noted that the encrypted data generated by the client may include not only the encrypted result of the test data but also the encrypted result of the encryption key. That is, the client may encrypt the test data together with the encryption key, and transmit the test data to the test service.
S130, performing interface test by using the encrypted data according to the test request through the test service.
After receiving the encrypted data and the test request sent by the client, the test service can utilize the encrypted data to perform interface test according to the test request. The test request may include information such as a test start time, a test result save address, and a pre-configured test parameter.
On the basis of the scheme, after the interface test is performed by the test service according to the test request and by using the encrypted data, the method further comprises:
if the interface test is detected to be finished, outputting a test result through the test service, and decrypting the encrypted data according to the pre-acquired encryption key matched with the test request to obtain decrypted data;
and generating a test report according to the test result and the decrypted data.
After the interface test is finished, the test service can output a test result, and meanwhile, the encrypted data is decrypted by utilizing the pre-acquired encryption key to obtain decrypted data. Based on the test results and the decrypted data, the test service may generate a test report. The test report can clearly present the interface test condition, which is beneficial to development, test and other personnel to improve codes, input data and the like, thereby achieving the test result meeting the requirements.
According to the technical scheme, test data are acquired through a client, a test request is generated, and an encryption key matched with the test request is generated based on a dynamic encryption tool; encrypting the test data according to the encryption key through the client to obtain encrypted data, and sending the encrypted data and the test request to the test service; and carrying out interface test by using the encrypted data according to the test request through the test service. The technical scheme solves the problem of poor safety of test data transmission in the interface test process, and the key can be automatically generated and updated through the dynamic encryption tool, so that the safety and the integrity of the test data transmission are ensured.
Example two
Fig. 2 is a flowchart of an interface testing method according to a second embodiment of the present application, which is based on the above embodiment. As shown in fig. 2, the method includes:
s210, acquiring test data through a client.
S220, partitioning the test data through the client to obtain at least two partitioned data, and generating a test request for matching each partitioned data.
In a test scene with larger data size of the test data or higher test data confidentiality requirement, the client can split the test data to obtain a plurality of block data and generate a test request matched with each block data. The test request corresponding to each piece of block data can comprise information such as the identification of the piece of block data, the association relation between the piece of block data and other pieces of block data, the test starting condition, the test result storage position, the test parameters and the like.
S230, based on the dynamic encryption tool, generating encryption keys of the block data according to the test requests matched with the block data.
The dynamic encryption tool can sequentially determine encryption algorithms matched with the test requests according to dynamic selection rules, and generate encryption keys of the block data according to the encryption algorithms.
S240, encrypting the block data according to the encryption key through the client to obtain encrypted data matched with each block data, and sending the encrypted data matched with each block data and the test request matched with each block data to the test service.
The client can encrypt each piece of block data by using an encryption key matched with the piece of block data to obtain encrypted data corresponding to each piece of block data. The client may sequentially send the encrypted data corresponding to the encrypted block data and the test request corresponding to the block data to the test service.
S250, performing interface test by using the encryption data matched with each piece of block data according to the test request matched with each piece of block data through the test service.
The test service can utilize the encryption data corresponding to each block data to carry out interface test according to the test request corresponding to each block data. For the situation that the test data must be complete to perform interface test, the test service can decrypt the encrypted data corresponding to each piece of block data by using the encryption key matched with each piece of block data to obtain each piece of block data. The test service can combine the block data to obtain test data, and interface test is performed by using the test data.
And S260, if the interface test is detected to be finished, destroying the encryption key matched with the test request based on the dynamic encryption tool.
If the test of the test service interface is finished, the encryption key matched with the test request can be destroyed by a dynamic encryption tool so as to avoid the leakage of the encryption key. In the destroying process, the dynamic encryption tool destroys the encryption key and also destroys the salt related to the encryption key generation together so as to ensure the absolute safety of the test data.
According to the technical scheme, test data are segmented, and test requests for matching the segmented data are generated; then based on the dynamic encryption tool, generating encryption keys of the block data according to the test request matched with the block data; encrypting the block data according to the encryption key by the client to obtain encrypted data matched with each block data, and sending the encrypted data matched with each block data and a test request matched with each block data to a test service; and finally, performing interface test by using the encrypted data matched with each piece of block data according to the test request matched with each piece of block data through the test service. The technical scheme can effectively prevent an attacker from intercepting or cracking all test data, and ensures the transmission safety of each piece of block data.
Example III
Fig. 3 is a schematic structural diagram of an interface testing device according to a third embodiment of the present application. As shown in fig. 3, the apparatus includes:
the encryption key generation module 310 is configured to obtain test data through a client, generate a test request, and generate an encryption key matched with the test request based on a dynamic encryption tool;
the encrypted data sending module 320 is configured to encrypt the test data according to the encryption key through the client to obtain encrypted data, and send the encrypted data and the test request to the test service;
the interface testing module 330 is configured to perform an interface test by using the encrypted data according to the test request through the test service.
In this aspect, the apparatus further includes:
the decryption data generation module is used for outputting a test result through the test service if the interface test is detected to be finished, and decrypting the encryption data according to the encryption key matched with the test request, which is acquired in advance, so as to obtain decryption data;
and the test report generating module is used for generating a test report according to the test result and the decrypted data.
In one possible implementation, the encryption key generation module 310 is specifically configured to:
based on the dynamic encryption tool, an encryption algorithm is determined according to a preset dynamic selection rule, and an encryption key is generated according to the encryption algorithm.
In a preferred embodiment, the apparatus further comprises:
the test data partitioning module is used for partitioning the test data through the client to obtain at least two partitioned data and generating a test request matched with each partitioned data;
the block key generation module is used for generating an encryption key of each block data according to the test request matched with each block data based on the dynamic encryption tool;
the block sending module is used for encrypting the block data according to the encryption key through the client to obtain encrypted data matched with each block data, and sending the encrypted data matched with each block data and a test request matched with each block data to the test service;
and the block testing module is used for carrying out interface testing by utilizing the encryption data matched with each block data according to the testing request matched with each block data through the testing service.
In this embodiment, optionally, the encryption key is generated by performing hash processing based on an encryption algorithm on the basis of a dynamic salt and a static salt.
On the basis of the scheme, the device further comprises:
and the key destroying module is used for destroying the encryption key matched with the test request based on the dynamic encryption tool if the interface test is detected to be finished.
In this scheme, optionally, the dynamic encryption tool is a dynamic encryption plug-in written based on Java language and integrated in the JFET environment.
The interface testing device provided by the embodiment of the application can execute the interface testing method provided by any embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method.
Example IV
Fig. 4 shows a schematic diagram of an electronic device 410 that may be used to implement an embodiment of the application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic equipment may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the applications described and/or claimed herein.
As shown in fig. 4, the electronic device 410 includes at least one processor 411, and a memory, such as a Read Only Memory (ROM) 412, a Random Access Memory (RAM) 413, etc., communicatively connected to the at least one processor 411, wherein the memory stores computer programs executable by the at least one processor, and the processor 411 may perform various suitable actions and processes according to the computer programs stored in the Read Only Memory (ROM) 412 or the computer programs loaded from the storage unit 418 into the Random Access Memory (RAM) 413. In the RAM 413, various programs and data required for the operation of the electronic device 410 may also be stored. The processor 411, the ROM 412, and the RAM 413 are connected to each other through a bus 414. An input/output (I/O) interface 415 is also connected to bus 414.
Various components in the electronic device 410 are connected to the I/O interface 415, including: an input unit 416 such as a keyboard, a mouse, etc.; an output unit 417 such as various types of displays, speakers, and the like; a storage unit 418, such as a magnetic disk, optical disk, or the like; and a communication unit 419 such as a network card, modem, wireless communication transceiver, etc. The communication unit 419 allows the electronic device 410 to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
The processor 411 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 411 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 411 performs the various methods and processes described above, such as interface test methods.
In some embodiments, the interface testing method may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as storage unit 418. In some embodiments, some or all of the computer program may be loaded and/or installed onto the electronic device 410 via the ROM 412 and/or the communication unit 419. When a computer program is loaded into RAM 413 and executed by processor 411, one or more steps of the interface test method described above may be performed. Alternatively, in other embodiments, the processor 411 may be configured to perform the interface test method in any other suitable manner (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out methods of the present application may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present application, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) through which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present application may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present application are achieved, and the present application is not limited herein.
The above embodiments do not limit the scope of the present application. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present application should be included in the scope of the present application.

Claims (10)

1. An interface test method, characterized in that the method is executed by an interface test system, the interface test system comprising a client and a test service; the method comprises the following steps:
the method comprises the steps that test data are obtained through a client, a test request is generated, and an encryption key matched with the test request is generated based on a dynamic encryption tool;
encrypting the test data according to the encryption key through the client to obtain encrypted data, and sending the encrypted data and the test request to the test service;
and carrying out interface test by using the encrypted data according to the test request through the test service.
2. The method of claim 1, wherein after performing the interface test with the encrypted data according to the test request through the test service, the method further comprises:
if the interface test is detected to be finished, outputting a test result through the test service, and decrypting the encrypted data according to the pre-acquired encryption key matched with the test request to obtain decrypted data;
and generating a test report according to the test result and the decrypted data.
3. The method of claim 1, wherein the generating an encryption key based on a dynamic encryption tool that matches a test request comprises:
based on the dynamic encryption tool, an encryption algorithm is determined according to a preset dynamic selection rule, and an encryption key is generated according to the encryption algorithm.
4. The method of claim 1, wherein after the test data is obtained by the client, the method further comprises:
partitioning the test data through the client to obtain at least two partitioned data, and generating a test request matched with each partitioned data;
based on the dynamic encryption tool, generating an encryption key of each piece of block data according to the test request matched with each piece of block data;
encrypting the block data according to the encryption key through the client to obtain encrypted data matched with each block data, and sending the encrypted data matched with each block data and a test request matched with each block data to a test service;
and carrying out interface test by using the encryption data matched with each piece of block data according to the test request matched with each piece of block data through the test service.
5. The method of claim 1, wherein the encryption key is generated based on a hash process based on a dynamic salt and a static salt.
6. The method of claim 1, wherein after performing the interface test with the encrypted data according to the test request through the test service, the method further comprises:
if the interface test is detected to be finished, destroying the encryption key matched with the test request based on the dynamic encryption tool.
7. The method of claim 1, wherein the dynamic encryption tool is a dynamic encryption plug-in written in Java based language integrated in a JMeter environment.
8. An interface test device is characterized in that the device is configured in an interface test system, and the interface test system comprises a client and a test service; comprising the following steps:
the encryption key generation module is used for acquiring test data through the client, generating a test request and generating an encryption key matched with the test request based on the dynamic encryption tool;
the encrypted data sending module is used for encrypting the test data according to the encryption key through the client to obtain encrypted data and sending the encrypted data and the test request to the test service;
and the interface test module is used for carrying out interface test by using the encrypted data according to the test request through the test service.
9. An electronic device, the electronic device comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the interface testing method of any one of claims 1-7.
10. A computer readable storage medium storing computer instructions for causing a processor to perform the interface testing method of any one of claims 1-7.
CN202310587377.0A 2023-05-23 2023-05-23 Interface testing method and device, electronic equipment and storage medium Pending CN116594894A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310587377.0A CN116594894A (en) 2023-05-23 2023-05-23 Interface testing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310587377.0A CN116594894A (en) 2023-05-23 2023-05-23 Interface testing method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116594894A true CN116594894A (en) 2023-08-15

Family

ID=87595228

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310587377.0A Pending CN116594894A (en) 2023-05-23 2023-05-23 Interface testing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116594894A (en)

Similar Documents

Publication Publication Date Title
CN113794706B (en) Data processing method and device, electronic equipment and readable storage medium
CN114595481A (en) Method, device, equipment and storage medium for processing response data
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN117725598A (en) An Zhuoduan data encryption and decryption method, device, equipment and medium
CN111400743B (en) Transaction processing method, device, electronic equipment and medium based on blockchain network
CN115442164B (en) Multi-user log encryption and decryption method, device, equipment and storage medium
CN116405199A (en) Encryption method, device, equipment and medium based on NTRU algorithm and SM2 algorithm
US11133926B2 (en) Attribute-based key management system
CN115883199A (en) File transmission method and device, electronic equipment and storage medium
CN115600215A (en) System startup method, system information processing method, device, equipment and medium thereof
CN115858914A (en) Method, device and system for inquiring hiding trace, terminal equipment and storage medium
CN113992345B (en) Webpage sensitive data encryption and decryption method and device, electronic equipment and storage medium
CN116594894A (en) Interface testing method and device, electronic equipment and storage medium
CN114117388A (en) Device registration method, device registration apparatus, electronic device, and storage medium
CN114239014A (en) File processing method and device based on offline device and electronic device
CN112565156A (en) Information registration method, device and system
CN113609156B (en) Data query and write method and device, electronic equipment and readable storage medium
CN116668026B (en) Method, device, equipment and storage medium for processing password card data
CN114520725B (en) Authentication method, device, equipment and storage medium based on distance constraint protocol
CN116933275A (en) Data leakage prevention method, device, equipment and storage medium
CN115238310A (en) Data encryption and decryption method, device, equipment and storage medium
CN116846680A (en) Data desensitization method, device, equipment and storage medium
CN117150451A (en) Radar starting method, radar starting device, electronic equipment and storage medium
CN117473536A (en) Data processing method, device, system and storage medium
CN117640083A (en) Data transmission method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination