WO2019056545A1 - 测试机自动化管理方法、装置、设备及存储介质 - Google Patents

测试机自动化管理方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2019056545A1
WO2019056545A1 PCT/CN2017/112310 CN2017112310W WO2019056545A1 WO 2019056545 A1 WO2019056545 A1 WO 2019056545A1 CN 2017112310 W CN2017112310 W CN 2017112310W WO 2019056545 A1 WO2019056545 A1 WO 2019056545A1
Authority
WO
WIPO (PCT)
Prior art keywords
priority
user
test machine
level code
operation request
Prior art date
Application number
PCT/CN2017/112310
Other languages
English (en)
French (fr)
Inventor
伍朗
伍振亮
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019056545A1 publication Critical patent/WO2019056545A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Definitions

  • the present application relates to the field of automated testing, and in particular, to a test machine automation management method, apparatus, device and storage medium.
  • test database files are stored in the test machine.
  • the number of these test machines is large, generally in a state of lack of management, and there is no platform for unified management.
  • the test machine may be used by some testers for other automated tests, or other things that are not related to the test, so that the test machine's test environment changes, such as incorrect environment variables or insufficient directory permissions, resulting in its When the corresponding automatic test occurs, various problems occur.
  • the test machine is abnormal, the abnormality of the test machine cannot be quickly diagnosed and processed. It is impossible to ensure that the test of the test machine can run normally and return the correct test result.
  • the present application provides a test machine automatic management method, device, device and storage medium, the purpose of which is to quickly diagnose and handle the abnormality of the automatic test machine to ensure the normal operation of the automatic test.
  • the application is implemented in this way.
  • the first aspect of the present application provides a test machine automatic management method, and the test machine automatic management method includes:
  • test machine automatic management device includes:
  • Level code setting module for setting the level code according to the abnormality of the test machine
  • a level code acquisition module configured to acquire a level code in the alarm information when detecting that the test machine is abnormal and issuing an alarm message
  • An automatic response processing module configured to acquire a processing priority according to the level code, and transfer the automatic response processing flow under the corresponding level code according to the processing priority;
  • the on-site processing prompting module is configured to issue an on-site processing prompt when the alarm information is still detected when the automatic response processing flow is completed.
  • a third aspect of the present application provides a terminal device including a memory, a processor, and computer readable instructions stored in the memory and executable on the processor, the processor executing the computer readable instructions Implement the following steps:
  • a fourth aspect of the present application provides a computer readable storage medium storing computer readable instructions that, when executed by a processor, implement the following steps:
  • the embodiment of the present application provides a test machine automatic management method, device, device and storage medium.
  • the level code corresponding to the alarm information is obtained, and the processing priority is obtained according to the level code, according to The processing priority is transferred to the automatic response processing flow under the corresponding level code.
  • the abnormal situation that may occur during the testing process of the testing machine is detected in advance, and the abnormality is processed in advance according to the alarm information, and the testing is realized.
  • the unified management of the machine avoids the defect that the test machine is inaccurate when the test machine is used for other purposes.
  • FIG. 1 is a flow chart of a method for automatically managing a test machine according to an embodiment of the present application
  • FIG. 2 is a flowchart of a method for automatically managing a test machine according to another embodiment of the present application
  • FIG. 3 is a flowchart of a method for automatically managing a test machine according to another embodiment of the present application.
  • step S22 is a flowchart of step S22 in a method for automatically managing a test machine according to another embodiment of the present application
  • FIG. 5 is a schematic structural diagram of a test machine automatic management apparatus according to another embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a test machine automation management apparatus according to another embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a terminal device according to another embodiment of the present application.
  • test machine automatic management method includes:
  • Step S10 According to the abnormality setting level code of the testing machine, when the abnormality of the testing machine is detected, the level code in the alarm information is obtained.
  • the abnormality of the test machine refers to some problems in the test machine, the test cannot be performed, or the test can be executed but the test machine can be predicted to fail due to the abnormality in the process of executing the test.
  • the abnormal state is stored, and each abnormal state that may occur is detected when the detection is performed, wherein the abnormality of the test machine includes but is not limited to the test machine, the network disconnection, the environment configuration information change, the storage space is insufficient, and the test
  • the alarm is in the state of use; the alarm information refers to the alarm signal information corresponding to the abnormality that occurs, that is, according to the alarm signal information, it can be clearly known what kind of abnormality is abnormal, and the content of the alarm information can be known through the level code.
  • the processing priority of the level code corresponding to the alarm information of the test machine or the network disconnection is the first priority
  • the processing priority of the level code corresponding to the alarm information of the configuration information change or insufficient storage space is the first priority.
  • Two priority the abnormality is that the test machine is in use
  • the processing priority of the level code corresponding to the alarm information is the third priority
  • the levels of the first priority, the second priority, and the third priority are sequentially decremented from high to low, wherein the level code may include a priority flag.
  • priority flag code can use numbers, such as the first priority The code code is 1, and the flag code of the second priority is 2, wherein the level of the first priority is higher than the second priority, and the abnormality flag code can be abbreviated by the Chinese pinyin of the problem included in the abnormality.
  • a 0 or 1 code representation that the machine can recognize.
  • Step S20 Obtain processing priority according to the level code, and transfer to the automatic response processing flow under the corresponding level code according to the processing priority.
  • step S20 obtaining the processing priority according to the level code refers to acquiring the priority flag code according to the level code, and prioritizing the higher priority level according to the flag code, and the automatic response processing flow means that the abnormality can be acquired according to the level code.
  • the processing scheme executed for the specific problem for example, when detecting the content testing machine of the abnormal alarm information, detecting that the priority level of the testing machine is the first priority, and preferentially processing the alarm information, automatically The startup process of the test machine is executed; when the content of the alarm information that is abnormal is detected as the network disconnection and the environment configuration information change, the priority of detecting the disconnection of the network and the change of the environment configuration information is the first priority and the first priority.
  • the network with the first priority is disconnected, and the process of automatically connecting to the network is executed.
  • the third-level environment configuration information change process is executed, that is, the environment configuration of the test machine is re-read. Information, reconfigure the environment based on the environment configuration information.
  • Step S30 When the alarm information is still detected when the automatic response processing flow is completed, an on-site processing prompt is issued.
  • step S30 when the automatic response processing flow is completed, the alarm information is re-detected.
  • the alarm information still exists, it indicates that the abnormal problem corresponding to the alarm information is not solved, that is, the automatic server automatic execution scheme cannot solve the abnormal problem.
  • manual processing is required, that is, the server issues an on-site processing prompt, prompting the maintenance person to perform on-site processing.
  • the embodiment of the present application provides an automatic management method for a test machine.
  • the level code corresponding to the alarm information is obtained, and the processing priority is obtained according to the level code, and the processing priority is transferred to the corresponding level.
  • the automatic response processing flow under the code, before the test is executed, the abnormal situation that may occur during the test of the test machine is detected in advance, and according to the alarm The information is processed in advance to realize the unified management of the test machine, and avoids the defect that the test machine is inaccurate when the test machine is used for other purposes.
  • test machine automatic management method includes:
  • Step S11 Obtain user rights according to the login name of the user.
  • step S11 the users who log in to the test machine management system have different roles, and there are general testers, test developers, or system administrators. If it is a general tester, you can only manage the test machine that you have added.
  • the test developer can manage the test machine of different users, including adding delete modifications, etc., and the system administrator can also perform operations on the test machine, among other things. Users can be managed or assigned different permissions.
  • the administrator uses the permission configuration tool to generate a static configuration table.
  • the static configuration table includes a file object identifier XX and a file authorization authority YY.
  • the file object identifier XX is each.
  • the unique identifier of the network file in the network file system used to determine the physical location of the network file.
  • the file authorization authority YY includes read, write, read and writable; the static configuration table is stored in the permission data storage end for the permission data to use. End call; each distributed node of the network file system deploys a network file operation interface and a static configuration table, wherein the network file operation interface is used to provide a file access program for the user to provide common files such as opening, closing, reading, and writing.
  • Directory operation the user sends a file operation request through the network file operation interface, the file operation request includes an operation object and a file operation; the test machine determines, according to the received file operation request, whether the operation object belongs to a local node or a remote node; if the operation object is a local node , the test machine is based on the operation
  • the matching algorithm in the local static configuration table searches for the corresponding file object identifier XX, and determines whether there is an operation authority for the node according to the file operation: if there is an operation permission, the file operation is performed on the node, and the processing result is returned to the user. If there is no permission, an unauthorized operation request is issued to the server.
  • the matching algorithm includes the BF algorithm and the shift-and algorithm.
  • the following uses the BF algorithm and the shift-and algorithm as examples to introduce the matching algorithm provided by the present application:
  • the whole process is based on the BF algorithm.
  • the matching process it is first determined whether the currently matched character in the text string is unique to the QP encoding. The character, based on the judgment result, determines a character that needs to be proportional to the value of the character to be matched in the pattern string, and determines whether the match is successful based on the comparison result.
  • the specific implementation manner of matching the pattern string in the text string may be:
  • the pattern string is directly matched with the QP encoded text string by using the shift-and algorithm, wherein when the data matching device obtains the pattern string p
  • Step S21 When it is detected that the test machine is abnormal and issues an alarm message, the level code corresponding to the alarm information is obtained.
  • Step S21 is the same as the step of step S10. For details, refer to the description of step S10, and details are not described herein again.
  • Step S31 Acquire processing priority according to the level code, and transfer to the automatic response processing flow under the corresponding level code according to the processing priority.
  • Step S31 is the same as the step of step S20. For details, refer to the description of step S20, and details are not described herein again.
  • Step S41 When the alarm information is still detected when the automatic response processing flow is completed, the on-site processing prompt is issued according to the user authority.
  • step S41 when the automatic response processing flow is completed, the alarm information is re-detected.
  • the alarm information still exists, it indicates that the abnormal problem corresponding to the alarm information is not solved, that is, the automatic server automatic execution scheme cannot solve the abnormal problem.
  • manual processing is required, that is, the server issues an on-site processing prompt according to the user authority and the abnormality problem, and prompts the maintenance person to perform on-site processing.
  • the automatic response processing process cannot process the In case of abnormality, if the problem is detected according to the user's authority, the tester should handle the problem, and then send the on-site processing prompt to the tester, prompting the tester to go to the site for processing.
  • Another embodiment of the present application provides a test machine automatic management method.
  • the user authority is obtained according to the login name of the user, and then includes:
  • Step S12 When it is detected that the operation request of the user exceeds its corresponding user authority, the server is requested to request an unauthorized operation request for the operation.
  • step S12 when it is detected that the user's operation request exceeds its corresponding user authority, at this time, the user cannot perform the operation, but the system records the operation content and performs an unauthorized operation application, for example, when the tester is testing. In the test, the test script may be modified. If there is no permission, the test cannot be continued. At this time, the unauthorized operation request can be performed to obtain the operation authority other than the set authority.
  • Step S22 When the unauthorized operation request is passed, the user authority is changed to include the function of the request by the unauthorized operation.
  • step S22 when the unauthorized operation request is passed, the user's authority may be modified, that is, the user's authority is expanded, so that the user can implement the operation, and the modification may be temporary modification of the permission or permanent modification of the permission.
  • Step S221 When the unauthorized operation request is passed, the function corresponding to the unauthorized operation request is added in the user authority mapping table and the deadline is set.
  • step S221 when modifying the authority of the user, setting the modification to the temporary modification authority, that is, setting the deadline for the function corresponding to the unauthorized operation request, for example, 4 hours, etc., the deadline is in the permission mapping table. Permissions correspond.
  • step S222 when the operation request corresponding to the unauthorized operation request is received again, the user authority mapping table is queried, and if the deadline is not reached, the function corresponding to the operation request is provided.
  • step S222 when the user applies for the unauthorized operation again, the system detects the permission mapping table, and determines whether the function corresponding to the operation is allowed to be provided according to the authority and time correspondence in the permission mapping table.
  • the server may record the unauthorized operation and apply to the system administrator, and when the unauthorized operation application is passed, the operation authority of the user is expanded, and the operation is performed. Setting the deadline time enables the user to perform the operation within the set time, which brings convenience to the user and ensures the security of the test system.
  • test machine automation management device 50 includes:
  • a level code setting module 506, configured to set a level code according to an abnormality of the testing machine
  • the level code obtaining module 501 is configured to acquire a level code in the alarm information when detecting that the test machine is abnormal and issuing an alarm message;
  • the automatic response processing module 502 is configured to obtain a processing priority according to the level code, and transfer the automatic response processing flow under the corresponding level code according to the processing priority;
  • the on-site processing prompting module 503 is configured to issue an on-site processing prompt when the presence of the alarm information is still detected when the automatic response processing flow is completed.
  • the abnormality of the test machine includes the test machine, the network disconnection, the environment configuration information change, the storage space is insufficient, and the test machine is in use state, wherein the abnormality is the level code corresponding to the test machine or the network disconnected alarm information.
  • the processing priority is the first priority
  • the processing priority of the level code corresponding to the alarm information in which the configuration information changes or the storage space is insufficient is the second priority
  • the abnormality is the level corresponding to the alarm information in which the testing machine is in use.
  • the processing priority of the code is the third priority, and the levels of the first priority, the second priority, and the third priority are sequentially decremented from high to low.
  • test machine automation management device further includes a user rights acquisition module 504 and an override operation module 505;
  • the user right obtaining module 504 acquires the user right according to the login name of the user;
  • the on-site processing prompting module 505 issues an on-site processing prompt according to the user authority
  • the unauthorized operation module 504 When it is detected that the operation request of the user exceeds its corresponding user authority, the unauthorized operation module 504 requests the server for an unauthorized operation request for allowing the operation;
  • the unauthorized operation module 504 changes the user authority to include the function of the request by the unauthorized operation.
  • Another embodiment of the present application provides a computer readable storage medium having stored thereon computer readable instructions that, when executed by a processor, implement the test machine automation management method in the above embodiments To avoid repetition, we will not repeat them here.
  • the computer readable instructions when executed by the processor, the functions of the modules/units in the automatic testing device of the testing machine in the above embodiments are implemented. To avoid repetition, details are not described herein again.
  • Fig. 7 is a schematic diagram of a terminal device in this embodiment.
  • the terminal device 6 includes a processor 60, a memory 61, and computer readable instructions 62 stored in the memory 61 and operable on the processor 60.
  • the processor 60 executes the computer readable instructions 62, the test machine in the above embodiment is automatically implemented.
  • the various steps of the management method are, for example, steps S10, S20, and S30 shown in FIG.
  • the processor 60 implements the functions of the modules/units of the tester automation management device in the above-described embodiments when the computer readable instructions 62 are executed.
  • computer readable instructions 62 may be partitioned into one or more modules/units, one or more modules/units being stored in memory 61 and executed by processor 60 to complete the application.
  • the one or more modules/units may be a series of computer readable instruction segments capable of performing a particular function for describing the execution of computer readable instructions 62 in the terminal device 6.
  • computer readable instructions 62 may be partitioned into a level code setting module 506, a level code acquisition module 501, an automatic response processing module 502, and a field processing prompt module 503 as shown in FIG.
  • the terminal device 6 can be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud server.
  • the terminal device may include, but is not limited to, the processor 60, the memory 61. It will be understood by those skilled in the art that FIG. 7 is only an example of the terminal device 6, and does not constitute a limitation of the terminal device 6, and may include more or less components than those illustrated, or combine some components, or different components.
  • the terminal device may further include an input/output device, a network access device, a bus, and the like.
  • the so-called processor 60 may be a central processing unit (CPU), or may be other general-purpose processors, a digital signal processor (DSP), an application specific integrated circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 61 may be an internal storage unit of the terminal device 6, such as a hard disk or a memory of the terminal device 6.
  • the memory 61 may also be an external storage device of the terminal device 6, such as a plug-in hard disk provided on the terminal device 6, a smart memory card (SMC), a Secure Digital (SD) card, and a flash memory card (Flash). Card) and so on.
  • the memory 61 may also include both an internal storage unit of the terminal device 6 and an external storage device.
  • the memory 61 is configured to store computer readable instructions And other programs and data required by the terminal device.
  • the memory 61 can also be used to temporarily store data that has been output or is about to be output.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated modules/units if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium.
  • the present application implements all or part of the processes in the foregoing embodiments, and may also be implemented by computer readable instructions, which may be stored in a computer readable storage medium.
  • the computer readable instructions when executed by a processor, may implement the steps of the various method embodiments described above.
  • the computer readable instructions comprise computer readable instruction code, which may be in the form of source code, an object code form, an executable file or some intermediate form or the like.
  • the computer readable medium can include any entity or device capable of carrying the computer readable instruction code, a recording medium, a USB flash drive, a removable hard drive, a magnetic disk, an optical disk, a computer memory, a read only memory (ROM, Read-Only) Memory), random access memory (RAM), electrical carrier signals, telecommunications signals, and software distribution media.
  • a recording medium a USB flash drive
  • a removable hard drive a magnetic disk, an optical disk
  • a computer memory a read only memory (ROM, Read-Only) Memory
  • RAM random access memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

一种测试机自动化管理方法、装置(50)、设备及存储介质,测试机自动化管理方法包括:当检测到测试机出现异常发出报警信息时,获取报警信息所对应的级别代码(S10、S21);根据级别代码获取处理优先级,并根据处理优先级转入相应级别代码下的自动响应处理流程(S20、S31);当自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,发出现场处理提示(S30、S41)。在执行测试之前,对测试机在测试过程中可能出现的异常情况预先进行检测,并根据报警信息预先对异常进行处理,实现了对测试机的统一管理,避免了测试机出现问题时不能及时处理导致无法正常测试的问题。

Description

测试机自动化管理方法、装置、设备及存储介质
本专利申请以2017年9月21日提交的申请号为201710857294.3,名称为“测试机自动化管理方法、装置、设备及存储介质”的中国发明专利申请为基础,并要求其优先权。
技术领域
本申请涉及自动化测试领域,特别涉及一种测试机自动化管理方法、装置、设备及存储介质。
背景技术
在自动化测试系统中,测试的数据库文件存放于测试机中,这些测试机数量较多,一般处于缺乏管理状态,没有一个平台来进行统一的管理。测试机可能会被一些测试人员拿来进行其他的自动化测试,或者做一些与测试无关的其他事情,使测试机的测试环境发生变化,例如环境变量不对或者目录权限不够等问题,导致在进行其对应的自动化测试的时候出现各种问题,当测试机出现异常时,不能对测试机出现的异常进行快速诊断和处理,无法保证测试机的测试能够正常运行并返回正确的测试结果。
发明内容
针对以上问题,本申请提供一种测试机自动化管理方法、装置、设备及存储介质,目的在于对自动化测试机的异常进行快速诊断处理,保证自动化测试的正常运行。
本申请是这样实现的,本申请第一方面提供一种测试机自动化管理方法,所述测试机自动化管理方法包括:
根据测试机的异常设置级别代码,当检测到所述测试机出现异常发出报警信息时,获取所述报警信息中的级别代码;
根据所述级别代码获取处理优先级,并根据所述处理优先级转入相应级别代码下的自动响应处理流程;
当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,发出现场处理提示。
本申请第二方面提供一种测试机自动化管理装置,所述测试机自动化管理装置包括:
级别代码设置模块,用于根据测试机的异常设置级别代码;
级别代码获取模块,当检测到所述测试机出现异常发出报警信息时,用于获取所述报警信息中的级别代码;
自动响应处理模块,用于根据所述级别代码获取处理优先级,并根据所述处理优先级转入相应级别代码下的自动响应处理流程;
现场处理提示模块,当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,用于发出现场处理提示。
本申请第三方面提供一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:
根据测试机的异常设置级别代码,当检测到所述测试机出现异常发出报警信息时,获取所述报警信息中的级别代码;
根据所述级别代码获取处理优先级,并根据所述处理优先级转入相应级别代码下的自动响应处理流程;
当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,发出现场处理提示。
本申请第四方面提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,所述计算机可读指令被处理器执行时实现如下步骤:
根据测试机的异常设置级别代码,当检测到所述测试机出现异常发出报警信息时,获取所述报警信息中的级别代码;
根据所述级别代码获取处理优先级,并根据所述处理优先级转入相应级别代码下的自动响应处理流程;
当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,发出现场处理提示。
本申请实施例提供一种测试机自动化管理方法、装置、设备及存储介质,当检测到测试机出现异常发出报警信息时,获取报警信息所对应的级别代码,根据级别代码获取处理优先级,根据处理优先级转入相应级别代码下的自动响应处理流程,在执行测试之前,对测试机在测试过程中可能出现的异常情况预先进行检测,并根据报警信息预先对异常进行处理,实现了对测试机的统一管理,避免了测试机用于其他用途时改变测试环境导致测试结果不准确的缺陷。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本申请一种实施例提供的一种测试机自动化管理方法的流程图;
图2是本申请另一种实施例提供的一种测试机自动化管理方法的流程图;
图3是本申请另一种实施例提供的一种测试机自动化管理方法的流程图;
图4是本申请另一种实施例提供的一种测试机自动化管理方法中的步骤S22的流程图;
图5是本申请另一种实施例提供的一种测试机自动化管理装置的结构示意图;
图6是本申请另一种实施例提供的一种测试机自动化管理装置的结构示意图;
图7是本申请另一种实施例提供的终端设备的结构示意图。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
为了说明本申请的技术方案,下面通过具体实施例来进行说明。
本申请实施例提供一种测试机自动化管理方法,如图1所示,该测试机自动化管理方法包括:
步骤S10.根据测试机的异常设置级别代码,当检测到测试机出现异常发出报警信息时,获取报警信息中的级别代码。
在步骤S10中,测试机出现的异常是指测试机中出现某些问题无法执行测试,或者可以执行测试但是能够预测到在执行测试的过程中由于该异常导致执行测试失败,将测试机经常出现的异常状态进行存储,当进行检测时对每个可能出现的异常状态进行检测,其中,测试机出现的异常包括但不限于测试机关机、网络断开、环境配置信息变化、存储空间不足以及测试机处于使用状态;报警信息是指根据出现的异常对应的报警信号信息,即根据该报警信号信息可以明确得知出现的异常为何种异常,具体可以通过级别代码了解该报警信息的内容,其中,异常为测试机关机或网络断开的报警信息所对应的级别代码的处理优先级为第一优先级,异常为配置信息变化或存储空间不足的报警信息所对应的级别代码的处理优先级为第二优先级,异常为测试机处于使用状态的报警信息所对应的级别代码的处理优先级为第三优先级,第一优先级、第二优先级以及第三优先级的级别依次由高到低递减,其中,级别代码可以包括优先级标志代码和异常标志代码,优先级标志代码可以采用数字,例如第一优先级的标 志代码为1,第二优先级的标志代码为2,其中,第一优先级的级别高于第二优先级,异常标志代码可以采用异常所包括问题的汉语拼音简写,当然,也可以采用其他机器可以识别的0或者1代码表示。
步骤S20.根据级别代码获取处理优先级,根据处理优先级转入相应级别代码下的自动响应处理流程。
在步骤S20中,根据级别代码获取处理优先级是指根据级别代码获取优先级标志代码,根据该标志代码优先处理级别较高的优先级,自动响应处理流程是指根据级别代码可以获取发生异常的具体问题,针对该具体问题执行的处理方案,例如,当检测到出现异常的报警信息的内容测试机关机时,检测到测试机关机的优先级别为第一优先级,优先处理该报警信息,自动执行对测试机的开机流程;当同时检测到出现异常的报警信息的内容为网络断开和环境配置信息变化时,检测到网络断开和环境配置信息变化的优先级别为第一优先级和第三优先级,则优先处理第一优先级的网络断开,执行自动连接网络的流程,网络连接成功后再执行第三优先级的环境配置信息变化流程,即重新读取该测试机的环境配置信息,根据环境配置信息重新配置环境。
步骤S30.当自动响应处理流程执行完毕时仍然检测到存在报警信息时,发出现场处理提示。
在步骤S30中,当自动响应处理流程执行完毕时重新检测报警信息,当仍然存在报警信息时,说明该报警信息所对应的异常问题没有被解决,即通过自动服务器自动执行方案无法实现解决异常问题,此时需要进行人工处理,即服务器发出现场处理提示,提示维修人进行现场处理。
本申请实施例提供一种测试机自动化管理方法,当检测到测试机出现异常发出报警信息时,获取报警信息所对应的级别代码,根据级别代码获取处理优先级,根据处理优先级转入相应级别代码下的自动响应处理流程,在执行测试之前,对测试机在测试过程中可能出现的异常情况预先进行检测,并根据报警 信息预先对异常进行处理,实现了对测试机的统一管理,避免了测试机用于其他用途时改变测试环境导致测试结果不准确的缺陷。
本申请另一种实施例提供一种测试机自动化管理方法,如图2所示,测试机自动化管理方法包括:
步骤S11.根据用户的登录名获取用户权限。
在步骤S11中,登录到测试机管理系统的用户会有不同的角色,有一般的测试人员、测试开发人员或者系统管理员。如果是一般的测试人员,就只能管理自己添加的测试机,测试开发人员可以管理不同用户的测试机,包括增加删除修改等操作,系统管理员也可以进行对测试机的操作,除此以外可以对用户进行管理,也可以给用户分配不同的权限。
对于不同的用户具有不同的操作权限,作为一种实施方式,管理员根据需求利用权限配置工具产生静态配置表,静态配置表包括文件对象标识XX和文件授权权限YY;文件对象标识XX是每个网络文件在网络文件系统中的唯一标识,用于确定网络文件的物理位置,文件授权权限YY包括读、写、可读和可写;将静态配置表存储在权限数据存储端,供权限数据使用端调用;网络文件系统的每个分布式节点均部署网络文件操作接口和静态配置表,其中网络文件操作接口用于提供给用户编写文件访问程序,提供打开、关闭、读、写等常见文件和目录操作;用户通过网络文件操作接口发送文件操作请求,文件操作请求包括操作对象和文件操作;测试机根据收到的文件操作请求,判断操作对象属于本地节点还是远程节点;如果操作对象为本地节点,测试机根据操作对象在本地静态配置表中匹配算法查找对应的文件对象标识XX,并根据文件操作判断是否有对该节点的操作权限:如果有操作权限,则对该节点执行文件操作,然后将处理结果返回给用户;如果没有权限,则向服务器发出越权操作请求。
匹配算法包括BF算法和shift-and算法,下面分别以BF算法和shift-and算法为例,分别对本申请提供的匹配算法进行介绍:
(一)BF算法:
以模式串的字符个数为m,文本串的字符个数为n为例,整个过程基于BF算法,在匹配过程中,先判断文本串中当前被匹配的字符是否为QP编码中涉及的特有字符,再基于判断结果,确定需要与模式串中待匹配的字符比数值大小的字符,并基于比较结果确定是否匹配成功。
若文本串为=69fa=\r\n=F25=2C=61=F2b,模式串为a≥b,则在文本串中匹配模式串的具体实现方式可以为:
(1)判断文本串中的第一个字符是否为“=”;判断结果为是,则继续判断第二、第三个字符是否为“\r”“\n”;判断结果为否,则将第二、第三个字符组成的数据作为十六进制的ASCII码,并将其解码为字符“i”,由此确定“i”与“a”不相同,匹配失败。
(2)重新从文本串的第四个字符开始,与模式串进行匹配:判断文本串的第四个字符是否为“=”;判断结果为否,则判断该第四个字符是否与模式串的第一个字符相同;判断结果为否,则匹配失败。
(3)重新从文本串的第五个字符开始,与模式串进行匹配:判断文本串的第五个字符是否为“=”;判断结果为否,然后确定该第五个字符与模式串中的第一个字符相同,从而模式串的第一个字符匹配成功。继续在文本串中匹配模式串的第二个字符:先后确定文本串中的第六个字符为“=”,第七八个字符为“\r\n”,然后继续判断文本串中的第九个字符是否为“=”;判断结果为是,则继续判断文本串中的第十、第十一个字符组成的十六进制数据在数值上是否与模式串的第二个字符相同;判断结果为否,则匹配失败。
(4)重新从文本串的第六个字符开始,基于上述匹配方法与模式串进行匹配,直至将文本串的所有字符匹配完毕才结束整个匹配过程。需要说明的是,由于已经确定文本串的第六至八个字符为QP编码中涉及的软回车,所以可以 直接重新从文本串的第九个字符开始,与模式串进行匹配,以提高匹配效率。其中,在匹配过程中获得,文本串中的字符串“=61=F2b”与模式串“a≥b”完全匹配。
(二)shift-and算法:
以模式串的字符个数为m,文本串的字符个数为n为例,利用shift-and算法将模式串与QP编码后的文本串直接进行匹配,其中,当数据匹配设备获得模式串p和文本串t后,需要先根据模式串p获得辅助表B(即B[pj]=B[pj]|0m-j10j-1),然后在每次匹配过程中,先判断文本串t中当前被匹配的字符是否为QP编码中涉及的特有字符,再根据判断结果,确定参与预设掩码D(即D=((D<<1)|0m-11)&B[q])更新运算的字符,最后根据确定的字符以及辅助表B更新预设掩码D,并在D中的最高位为1时,确定整个模式字符串匹配成功,在文本串中最后一个字符匹配完毕后,确定匹配结束。
其中,当文本串中当前被匹配的字符不是“=”时,直接将当前被匹配的字符对应的辅助表B中的位掩码与目前的预设掩码D带入预设公式D=((D<<1)|0m-11)&B[q]中,实现D更新运算;当文本串中当前被匹配的字符是“=”时,先判断该“=”后面邻近的两个字符是否为“\r\n”,然后当判断结果为否时,利用公式q=(tpost+1<<4)|tpost+2确定后两个字符所组成的十六进制ASCII码值,然后将该ASCII码值解码为对应的字符,将解码后的字符确定为需要参与D更新运算涉及的字符,当判断结果为是时,继续判断该后两个字符邻近的后一个字符是否为“=”。
步骤S21.当检测到测试机出现异常发出报警信息时,获取报警信息所对应的级别代码。
步骤S21与步骤S10的步骤相同,具体请参见步骤S10的描述,在此不再赘述。
步骤S31.根据级别代码获取处理优先级,根据处理优先级转入相应级别代码下的自动响应处理流程。
步骤S31与步骤S20的步骤相同,具体请参见步骤S20的描述,在此不再赘述。
步骤S41.当自动响应处理流程执行完毕时仍然检测到存在报警信息时,根据用户权限发出现场处理提示。
在步骤S41中,当自动响应处理流程执行完毕时重新检测报警信息,当仍然存在报警信息时,说明该报警信息所对应的异常问题没有被解决,即通过自动服务器自动执行方案无法实现解决异常问题,此时需要进行人工处理,即服务器根据用户权限和出现的异常问题发出现场处理提示,提示维修人进行现场处理,例如,当测试机出现环境配置变化异常时,通过自动响应处理流程不能处理该异常时,根据用户权限检测到该问题应该有测试人员进行处理,则向测试人员发送现场处理提示,提示测试人员到现场进行处理。
本申请另一种实施例提供一种测试机自动化管理方法,如图3所示,根据用户的登录名获取用户权限,之后还包括:
步骤S12.当检测到用户的操作请求超过其对应的用户权限时,向服务器申请允许操作的越权操作请求。
在步骤S12中,当检测到用户的操作请求超过其对应的用户权限时,此时,用户不能进行操作,但是系统会记录该操作内容,并进行越权操作申请,例如,测试人员在进行测试时,在测试时可能出现修改测试脚本的情况,如果没有权限就不能继续进行测试,此时,可以进行越权操作请求,获取设定权限外的操作权限。
步骤S22.当越权操作请求通过时,更改用户权限使其包括通过所越权操作请求的功能。
在步骤S22中,当越权操作请求通过时,可以修改用户的权限,即将用户的权限进行扩大,使用户可以实现该操作,该修改可以为临时修改权限,也可以为永久修改权限。
作为一种实施方式,如图4所示,当越权请求通过时,更改用户权限使其包括通过越权请求的功能,包括:
步骤S221.当越权操作请求通过时,在用户权限映射表中增加越权操作请求对应的功能并设置截止时间。
在步骤S221中,在修改用户的权限时,将该修改设置为临时修改权限,即对越权操作请求对应的功能设置截止时间,例如,4个小时等等,该截止时间在权限映射表中与权限相对应。
步骤S222.再次接收到越权操作请求对应的操作请求时,查询用户权限映射表,若未到达截止时间,则提供操作请求所对应的功能。
在步骤S222中,当用户再次申请该越权操作时,系统检测权限映射表,根据权限映射表中的权限与时间对应关系判定是否允许提供该操作所对应的功能。
本申请实施例在用户的操作请求超出其权限范围时,可以由服务器对该越权操作进行记录,并向系统管理员提出申请,当越权操作申请通过时,扩大用户的操作权限,并且对该操作设置截止时间,实现了用户可以在设定的时间内执行该操作,给用户带来了方便,同时保证了测试系统的安全性。
本申请另一种实施例提供一种测试机自动化管理装置50,如图5所示,测试机自动化管理装置50包括:
级别代码设置模块506,用于根据测试机的异常设置级别代码;
级别代码获取模块501,当检测到测试机出现异常发出报警信息时,用于获取报警信息中的级别代码;
自动响应处理模块502,用于根据级别代码获取处理优先级,并根据处理优先级转入相应级别代码下的自动响应处理流程;
现场处理提示模块503,当自动响应处理流程执行完毕时仍然检测到存在报警信息时,用于发出现场处理提示。
其中,测试机的异常包括测试机关机、网络断开、环境配置信息变化、存储空间不足以及测试机处于使用状态,其中,异常为测试机关机或网络断开的报警信息所对应的级别代码的处理优先级为第一优先级,异常为配置信息变化或存储空间不足的报警信息所对应的级别代码的处理优先级为第二优先级,异常为测试机处于使用状态的报警信息所对应的级别代码的处理优先级为第三优先级,第一优先级、第二优先级以及第三优先级的级别依次由高到低递减。
如图6所示,测试机自动化管理装置还包括用户权限获取模块504和越权操作模块505;
用户权限获取模块504根据用户的登录名获取用户权限;
当自动响应处理流程执行完毕时仍然检测到存在报警信息时,现场处理提示模块505根据用户权限发出现场处理提示;
当检测到用户的操作请求超过其对应的用户权限时,越权操作模块504向服务器申请允许操作的越权操作请求;
当越权操作请求通过时,越权操作模块504更改用户权限使其包括通过越权操作请求的功能。
上述终端设备中模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
本申请另一种实施例提供一计算机可读存储介质,该计算机可读存储介质上存储有计算机可读指令,该计算机可读指令被处理器执行时实现上述实施例中的测试机自动化管理方法,为避免重复,这里不再赘述。或者,该计算机可读指令被处理器执行时实现上述实施例中一种测试机自动化管理装置中各模块/单元的功能,为避免重复,这里不再赘述。
图7是本实施例中终端设备的示意图。如图7所示,终端设备6包括处理器60、存储器61以及存储在存储器61中并可在处理器60上运行的计算机可读指令62。处理器60执行计算机可读指令62时实现上述实施例中测试机自动 化管理方法的各个步骤,例如图1所示的步骤S10、S20和S30。或者,处理器60执行计算机可读指令62时实现上述实施例中测试机自动化管理装置各模块/单元的功能。
示例性的,计算机可读指令62可以被分割成一个或多个模块/单元,一个或者多个模块/单元被存储在存储器61中,并由处理器60执行,以完成本申请。一个或多个模块/单元可以是能够完成特定功能的一系列计算机可读指令段,该指令段用于描述计算机可读指令62在终端设备6中的执行过程。例如,计算机可读指令62可以被分割成如图5所示的级别代码设置模块506、级别代码获取模块501、自动响应处理模块502、现场处理提示模块503。
该终端设备6可以是桌上型计算机、笔记本、掌上电脑及云端服务器等计算设备。终端设备可包括,但不仅限于,处理器60、存储器61。本领域技术人员可以理解,图7仅仅是终端设备6的示例,并不构成对终端设备6的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如终端设备还可以包括输入输出设备、网络接入设备、总线等。
所称处理器60可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
存储器61可以是终端设备6的内部存储单元,例如终端设备6的硬盘或内存。存储器61也可以是终端设备6的外部存储设备,例如终端设备6上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,存储器61还可以既包括终端设备6的内部存储单元也包括外部存储设备。存储器61用于存储计算机可读指令 以及终端设备所需的其他程序和数据。存储器61还可以用于暂时地存储已经输出或者将要输出的数据。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实现上述实施例方法中的全部或部分流程,也可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一计算机可读存储介质中,该计算机可读指令在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机可读指令包括计算机可读指令代码,所述计算机可读指令代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机可读指令代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读介质不包括是电载波信号和电信信号。
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其 依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。

Claims (20)

  1. 一种测试机自动化管理方法,其特征在于,所述测试机自动化管理方法包括:
    根据测试机的异常设置级别代码,当检测到所述测试机出现异常发出报警信息时,获取所述报警信息中的级别代码;
    根据所述级别代码获取处理优先级,并根据所述处理优先级转入相应级别代码下的自动响应处理流程;
    当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,发出现场处理提示。
  2. 根据权要求1所述的测试机自动化管理方法,其特征在于,所述测试机的异常包括测试机关机、网络断开、环境配置信息变化、存储空间不足以及测试机处于使用状态,其中,异常为测试机关机或网络断开的报警信息所对应的级别代码的处理优先级为第一优先级,异常为配置信息变化或存储空间不足的报警信息所对应的级别代码的处理优先级为第二优先级,异常为测试机处于使用状态的报警信息所对应的级别代码的处理优先级为第三优先级,所述第一优先级、所述第二优先级以及第三优先级的级别依次由高到低递减。
  3. 根据权要求1所述的测试机自动化管理方法,其特征在于,当检测到所述测试机出现异常发出报警信息时,获取所述报警信息所对应的级别代码,之前还包括:
    根据用户的登录名获取用户权限;
    当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,发出现场处理提示,包括:
    当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,根据所述用户权限发出现场处理提示。
  4. 根据权要求3所述的测试机自动化管理方法,其特征在于,根据用户的登录名获取用户权限,之后还包括:
    当检测到用户的操作请求超过其对应的用户权限时,向服务器申请允许所述操作请求中的越权操作请求;
    当所述越权操作请求通过时,更改所述用户权限使其包括通过所述越权操作请求的功能。
  5. 根据权要求4所述的测试机自动化管理方法,其特征在于,当所述越权请求通过时,更改所述用户权限使其包括通过所述越权请求的功能,包括:
    当所述越权操作请求通过时,在用户权限映射表中增加所述越权操作请求对应的功能并设置截止时间;
    再次接收到所述越权操作请求对应的操作请求时,查询所述用户权限映射表,若未到达所述截止时间,则提供所述操作请求所对应的功能。
  6. 根据权要求3所述的测试机自动化管理方法,其特征在于,根据用户的登录名获取用户权限,之后还包括:
    根据收到的文件操作请求,判断操作对象属于本地节点还是远程节点;
    如果操作对象为本地节点,根据操作对象在本地静态配置表中匹配算法查找对应的文件对象标识,并根据文件操作判断是否有对该节点的操作权限:
    如果有操作权限,则对该节点执行文件操作,然后将处理结果返回给用户;
    如果没有权限,则向服务器发出越权操作请求。
  7. 一种测试机自动化管理装置,其特征在于,所述测试机自动化管理装置包括:
    级别代码设置模块,用于根据测试机的异常设置级别代码;
    级别代码获取模块,当检测到所述测试机出现异常发出报警信息时,用于获取所述报警信息中的级别代码;
    自动响应处理模块,用于根据所述级别代码获取处理优先级,并根据所述处理优先级转入相应级别代码下的自动响应处理流程;
    现场处理提示模块,当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,用于发出现场处理提示。
  8. 如权利要求7所述的测试机自动化管理装置,其特征在于,所述测试机自动化管理装置还包括用户权限获取模块和越权操作模块;
    所述用户权限获取模块根据用户的登录名获取用户权限;
    当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,所述现场处理提示模块根据所述用户权限发出现场处理提示;
    当检测到用户的操作请求超过其对应的用户权限时,所述越权操作模块向服务器申请允许操作请求中的越权操作请求;
    当所述越权操作请求通过时,所述越权操作模块更改所述用户权限使其包括通过所述越权操作请求的功能。
  9. 一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时实现如下步骤:
    根据测试机的异常设置级别代码,当检测到所述测试机出现异常发出报警信息时,获取所述报警信息中的级别代码;
    根据所述级别代码获取处理优先级,并根据所述处理优先级转入相应级别代码下的自动响应处理流程;
    当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,发出现场处理提示。
  10. 根据权要求9所述的终端设备,其特征在于,所述测试机的异常包括测试机关机、网络断开、环境配置信息变化、存储空间不足以及测试机处于使用状态,其中,异常为测试机关机或网络断开的报警信息所对应的级别代码的处理优先级为第一优先级,异常为配置信息变化或存储空间不足的报警信息所对应的级别代码的处理优先级为第二优先级,异常为测试机处于使用状态的报警 信息所对应的级别代码的处理优先级为第三优先级,所述第一优先级、所述第二优先级以及第三优先级的级别依次由高到低递减。
  11. 根据权要求9所述的终端设备,其特征在于,当检测到所述测试机出现异常发出报警信息时,获取所述报警信息所对应的级别代码之前,所述处理器执行所述计算机可读指令时还实现如下步骤:
    根据用户的登录名获取用户权限;
    当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,发出现场处理提示,包括:
    当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,根据所述用户权限发出现场处理提示。
  12. 根据权要求11所述的终端设备,其特征在于,根据用户的登录名获取用户权限之后,所述处理器执行所述计算机可读指令时还实现如下步骤:
    当检测到用户的操作请求超过其对应的用户权限时,向服务器申请允许所述操作请求中的越权操作请求;
    当所述越权操作请求通过时,更改所述用户权限使其包括通过所述越权操作请求的功能。
  13. 根据权要求12所述的终端设备,其特征在于,当所述越权请求通过时,更改所述用户权限使其包括通过所述越权请求的功能,包括:
    当所述越权操作请求通过时,在用户权限映射表中增加所述越权操作请求对应的功能并设置截止时间;
    再次接收到所述越权操作请求对应的操作请求时,查询所述用户权限映射表,若未到达所述截止时间,则提供所述操作请求所对应的功能。
  14. 根据权要求11所述的终端设备,其特征在于,根据用户的登录名获取用户权限之后,所述处理器执行所述计算机可读指令时还实现如下步骤:
    根据收到的文件操作请求,判断操作对象属于本地节点还是远程节点;
    如果操作对象为本地节点,根据操作对象在本地静态配置表中匹配算法查找对应的文件对象标识,并根据文件操作判断是否有对该节点的操作权限:
    如果有操作权限,则对该节点执行文件操作,然后将处理结果返回给用户;
    如果没有权限,则向服务器发出越权操作请求。
  15. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,其特征在于,所述计算机可读指令被处理器执行时实现如下步骤:
    根据测试机的异常设置级别代码,当检测到所述测试机出现异常发出报警信息时,获取所述报警信息中的级别代码;
    根据所述级别代码获取处理优先级,并根据所述处理优先级转入相应级别代码下的自动响应处理流程;
    当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,发出现场处理提示。
  16. 根据权要求15所述的计算机可读存储介质,其特征在于,所述测试机的异常包括测试机关机、网络断开、环境配置信息变化、存储空间不足以及测试机处于使用状态,其中,异常为测试机关机或网络断开的报警信息所对应的级别代码的处理优先级为第一优先级,异常为配置信息变化或存储空间不足的报警信息所对应的级别代码的处理优先级为第二优先级,异常为测试机处于使用状态的报警信息所对应的级别代码的处理优先级为第三优先级,所述第一优先级、所述第二优先级以及第三优先级的级别依次由高到低递减。
  17. 根据权要求15所述的计算机可读存储介质,其特征在于,当检测到所述测试机出现异常发出报警信息时,获取所述报警信息所对应的级别代码之前,所述处理器执行所述计算机可读指令时还实现如下步骤:
    根据用户的登录名获取用户权限;
    当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,发出现场处理提示,包括:
    当所述自动响应处理流程执行完毕时仍然检测到存在所述报警信息时,根据所述用户权限发出现场处理提示。
  18. 根据权要求17所述的计算机可读存储介质,其特征在于,根据用户的登录名获取用户权限之后,所述处理器执行所述计算机可读指令时还实现如下步骤:
    当检测到用户的操作请求超过其对应的用户权限时,向服务器申请允许所述操作请求中的越权操作请求;
    当所述越权操作请求通过时,更改所述用户权限使其包括通过所述越权操作请求的功能。
  19. 根据权要求18所述的计算机可读存储介质,其特征在于,当所述越权请求通过时,更改所述用户权限使其包括通过所述越权请求的功能,包括:
    当所述越权操作请求通过时,在用户权限映射表中增加所述越权操作请求对应的功能并设置截止时间;
    再次接收到所述越权操作请求对应的操作请求时,查询所述用户权限映射表,若未到达所述截止时间,则提供所述操作请求所对应的功能。
  20. 根据权要求17所述的计算机可读存储介质,其特征在于,根据用户的登录名获取用户权限之后,所述处理器执行所述计算机可读指令时还实现如下步骤:
    根据收到的文件操作请求,判断操作对象属于本地节点还是远程节点;
    如果操作对象为本地节点,根据操作对象在本地静态配置表中匹配算法查找对应的文件对象标识,并根据文件操作判断是否有对该节点的操作权限:
    如果有操作权限,则对该节点执行文件操作,然后将处理结果返回给用户;
    如果没有权限,则向服务器发出越权操作请求。
PCT/CN2017/112310 2017-09-21 2017-11-22 测试机自动化管理方法、装置、设备及存储介质 WO2019056545A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710857294.3 2017-09-21
CN201710857294.3A CN107678917B (zh) 2017-09-21 2017-09-21 测试机自动化管理方法、装置、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2019056545A1 true WO2019056545A1 (zh) 2019-03-28

Family

ID=61136039

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/112310 WO2019056545A1 (zh) 2017-09-21 2017-11-22 测试机自动化管理方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN107678917B (zh)
WO (1) WO2019056545A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110362062B (zh) * 2019-07-12 2022-06-24 上海瀚银信息技术有限公司 一种故障自动处理系统
CN112964974A (zh) * 2021-03-18 2021-06-15 嘉盛半导体(苏州)有限公司 半导体测试监控方法、装置、设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1555031A (zh) * 2003-12-22 2004-12-15 高金铎 一种通过互联网智能报警系统及方法
CN101145969A (zh) * 2007-10-25 2008-03-19 中兴通讯股份有限公司 一种减少网元上报告警数量的方法及系统
US20090193436A1 (en) * 2008-01-30 2009-07-30 Inventec Corporation Alarm display system of cluster storage system and method thereof
CN103544093A (zh) * 2012-07-13 2014-01-29 深圳市快播科技有限公司 监控报警控制方法及其系统
CN103684880A (zh) * 2013-12-31 2014-03-26 上海斐讯数据通信技术有限公司 控制告警的方法及告警装置
CN104252401A (zh) * 2014-08-29 2014-12-31 北京阅联信息技术有限公司 一种基于权重的设备状态判断方法及其系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1555031A (zh) * 2003-12-22 2004-12-15 高金铎 一种通过互联网智能报警系统及方法
CN101145969A (zh) * 2007-10-25 2008-03-19 中兴通讯股份有限公司 一种减少网元上报告警数量的方法及系统
US20090193436A1 (en) * 2008-01-30 2009-07-30 Inventec Corporation Alarm display system of cluster storage system and method thereof
CN103544093A (zh) * 2012-07-13 2014-01-29 深圳市快播科技有限公司 监控报警控制方法及其系统
CN103684880A (zh) * 2013-12-31 2014-03-26 上海斐讯数据通信技术有限公司 控制告警的方法及告警装置
CN104252401A (zh) * 2014-08-29 2014-12-31 北京阅联信息技术有限公司 一种基于权重的设备状态判断方法及其系统

Also Published As

Publication number Publication date
CN107678917A (zh) 2018-02-09
CN107678917B (zh) 2020-03-20

Similar Documents

Publication Publication Date Title
CN107451040B (zh) 故障原因的定位方法、装置及计算机可读存储介质
WO2018000607A1 (zh) 一种识别测试用例失败原因的方法及电子设备
CN111695156A (zh) 业务平台的访问方法、装置、设备及存储介质
CN110088744B (zh) 一种数据库维护方法及其系统
CN111258850B (zh) 一种基于Linux系统的更新软件信息的方法及装置
US9703937B2 (en) Method to prevent operating system digital product key activation failures
WO2019056475A1 (zh) 测试任务自动化管理方法、装置、设备及存储介质
CN113504932B (zh) 一种固件数据更新方法和装置
US20230291587A1 (en) Blockchain-based cloud platform authentication method, system and device and medium
CN110063042A (zh) 一种数据库故障的响应方法及其终端
WO2019085386A1 (zh) 软件版本测试方法、装置、终端设备及存储介质
WO2021174817A1 (zh) 数据库自动化审计方法、系统、设备及存储介质
CN112906054A (zh) 多租户的数据库隔离方法、装置及电子设备
WO2020015116A1 (zh) 数据库监控方法及终端设备
WO2019148657A1 (zh) 关联环境测试方法、电子装置及计算机可读存储介质
WO2019056545A1 (zh) 测试机自动化管理方法、装置、设备及存储介质
WO2021113016A1 (en) Autopilot re-enrollment of managed devices
CN112017330B (zh) 智能锁参数配置方法、装置、智能锁及存储介质
CN111045710A (zh) 一种基于IPMI命令的SAS-Expander固件升级的方法、设备及介质
CN111209606A (zh) 一种预警raid卡后硬盘变动的方法、装置和设备
CN109933351A (zh) 一种修复和升级Linux系统的方法与装置
CN112583890B (zh) 基于企业办公系统的消息推送方法、装置和计算机设备
CN114817010A (zh) 一种基于Python的Redfish自动化测试方法及装置
CN110647771B (zh) 一种mysql数据库存储完整性校验保护方法及装置
CN110807037B (zh) 一种数据修改方法、装置、电子设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17925847

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 30.09.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17925847

Country of ref document: EP

Kind code of ref document: A1