[go: up one dir, main page]

CN112749078B - Buried point testing method and device - Google Patents

Buried point testing method and device Download PDF

Info

Publication number
CN112749078B
CN112749078B CN201911052577.6A CN201911052577A CN112749078B CN 112749078 B CN112749078 B CN 112749078B CN 201911052577 A CN201911052577 A CN 201911052577A CN 112749078 B CN112749078 B CN 112749078B
Authority
CN
China
Prior art keywords
buried
domain name
point data
data packet
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911052577.6A
Other languages
Chinese (zh)
Other versions
CN112749078A (en
Inventor
刘宁
高楚云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Wodong Tianjun Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Wodong Tianjun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Wodong Tianjun Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201911052577.6A priority Critical patent/CN112749078B/en
Publication of CN112749078A publication Critical patent/CN112749078A/en
Application granted granted Critical
Publication of CN112749078B publication Critical patent/CN112749078B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Prevention of errors by analysis, debugging or testing of software
    • G06F11/3668Testing of software
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Prevention of errors by analysis, debugging or testing of software
    • G06F11/3668Testing of software
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Prevention of errors by analysis, debugging or testing of software
    • G06F11/3668Testing of software
    • G06F11/3672Test management
    • G06F11/3692Test management for test results analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24564Applying rules; Deductive queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a buried point testing method and device, and relates to the technical field of computers. One embodiment of the method comprises the following steps: monitoring the domain name of a network data packet transmitted by a packet grasping tool; copying the embedded point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program; and detecting the buried data based on a dynamic rule base and generating a test report. The embodiment can solve the technical problems of low test efficiency and higher missing test rate.

Description

Buried point testing method and device
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and an apparatus for testing a buried point.
Background
With the rapid development of the internet and information technology, various application programs are widely used in the work and life of people. In order to investigate whether a function satisfies a user's desire, buried point data is often preset in an application program. If the user triggers the function module with the embedded point preset in the process of using the application program, the application program can send corresponding embedded point data to the online server. By processing the embedded point data and further analyzing, whether the functions of the application program are widely used by users can be estimated, and the application program can be adjusted or improved according to the analysis result of the embedded point data, so that the user requirements are better met, and the user experience is improved.
In order to ensure the correctness of the analysis result of the embedded data, the tester needs to test the embedded data before the application program is released.
In the process of implementing the present invention, the inventor finds that at least the following problems exist in the prior art:
After capturing the network data packet through the capture tool, a tester needs to extract the buried point data, and then compares the buried point data with the buried point data demand document one by one, so that the time and the labor are consumed, the test efficiency is low, the error is easy, and the missing test rate is high.
Disclosure of Invention
In view of the above, the embodiments of the present invention provide a buried point testing method and apparatus, so as to solve the technical problems of low testing efficiency and high missing testing rate.
To achieve the above object, according to an aspect of an embodiment of the present invention, there is provided a buried point testing method including:
Monitoring the domain name of a network data packet transmitted by a packet grasping tool;
Copying the embedded point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program;
and detecting the buried data based on a dynamic rule base and generating a test report.
Optionally, copying the embedded point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program, including:
Judging whether the domain name of the network data packet is consistent with the domain name reported by the embedded point data of the application program;
if yes, copying the buried point data in the network data packet.
Optionally, the dynamic rule base includes general rules and/or custom rules;
before the buried data is detected and the test report is generated based on the dynamic rule base, the method further comprises the following steps:
abstracting fields of buried point data in a demand document into general rules; and/or the number of the groups of groups,
And generating custom rules by adopting regular expressions for fields of buried point data in the demand document.
Optionally, detecting the buried data based on a dynamic rule base includes:
If the buried data accords with the general rule or the custom rule, the detection result is passed;
If the buried data does not accord with the general rule and the custom rule, the detection result is failure.
In addition, according to another aspect of the embodiment of the present invention, there is provided a buried point testing apparatus, including:
the monitoring module is used for monitoring the domain name of the network data packet transmitted by the packet grabbing tool;
The copying module is used for copying the embedded point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program;
and the test module is used for detecting the buried data based on the dynamic rule base and generating a test report.
Optionally, the copy module is further configured to:
Judging whether the domain name of the network data packet is consistent with the domain name reported by the embedded point data of the application program;
if yes, copying the buried point data in the network data packet.
Optionally, the dynamic rule base includes general rules and/or custom rules;
the test module is also used for:
before the buried point data is detected and a test report is generated based on a dynamic rule base, abstracting fields of the buried point data in the requirement document into general rules; and/or the number of the groups of groups,
And generating custom rules by adopting regular expressions for fields of buried point data in the demand document.
Optionally, the test module is further configured to:
If the buried data accords with the general rule or the custom rule, the detection result is passed;
If the buried data does not accord with the general rule and the custom rule, the detection result is failure.
According to another aspect of an embodiment of the present invention, there is also provided an electronic device including:
One or more processors;
Storage means for storing one or more programs,
The one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods of any of the embodiments described above.
According to another aspect of an embodiment of the present invention, there is also provided a computer readable medium having stored thereon a computer program which, when executed by a processor, implements the method according to any of the embodiments described above.
One embodiment of the above invention has the following advantages or benefits: by adopting the technical means of detecting the buried point data based on the dynamic rule base by copying the buried point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the buried point data of the application program, the technical problems of low test efficiency and higher missing test rate in the prior art are overcome. According to the embodiment of the invention, the embedded point data in the network data packet is copied according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program, so that the additional operation of screening the network data packet is reduced, and the embedded point data of the application program can be automatically collected; and the buried point data is automatically detected according to the dynamic rule base, so that the manpower can be saved, the accuracy of buried point test is improved, and missing test is effectively avoided.
Further effects of the above-described non-conventional alternatives are described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
FIG. 1 is a schematic diagram of the main flow of a buried point testing method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of filtering out domain name consistent network packets in accordance with an embodiment of the invention;
FIG. 3 is a schematic diagram of demand document embedded point data according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a generic rule according to an embodiment of the invention;
FIG. 5 is a schematic diagram of custom rules according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of the results of detection based on a general rule according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of the results of detection based on custom rules according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of the main flow of a buried point testing method according to a referenceable embodiment of the present invention;
FIG. 9 is a schematic diagram of the main flow of a buried point testing method according to another referenceable embodiment of the present invention;
FIG. 10 is a schematic diagram of the main modules of a buried point testing apparatus according to an embodiment of the present invention;
FIG. 11 is an exemplary system architecture diagram in which embodiments of the present invention may be applied;
Fig. 12 is a schematic diagram of a computer system suitable for use in implementing an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, in which various details of the embodiments of the present invention are included to facilitate understanding, and are to be considered merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
In the prior art, after capturing a network data packet through a packet capturing tool, a tester needs to extract buried point data, and then compares the buried point data with a buried point data demand document one by one, so that the time and the labor are consumed, and errors are easy to occur; especially when the number of buried points is large, a tester needs to frequently extract the buried point data through the wrapping tool, so that the steps are more, the cost is higher, and the test efficiency is lower; and moreover, the buried data is manually compared and checked, so that errors are easy to occur, and the missing detection rate is high.
In order to solve the technical problems in the prior art, the embodiment of the invention copies the embedded point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program, reduces the additional operation of screening the network data packet, and can automatically collect the embedded point data of the application program, thereby improving the test efficiency and reducing the missing test rate.
Fig. 1 is a schematic diagram of a main flow of a buried point testing method according to an embodiment of the present invention. As an embodiment of the present invention, as shown in fig. 1, the buried point test method may include:
Step 101, monitoring the domain name of the network data packet transmitted by the packet grasping tool.
When the tester connects the packet capturing tool with the application program and triggers the application program, the packet capturing tool transmits the network data packet to the on-line server, and monitors and controls the domain name of the network data packet. Alternatively, the bale plucker may be Fiddler or Whistle, etc. Wherein Fiddler is a Http protocol debug agent which can record and check Http communications between a computer and the Internet; whistle is an Http protocol debug agent that can record and check Http communications between a computer and the internet.
And 102, copying the embedded point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program.
In the embodiment of the invention, the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program can be preconfigured. The corresponding relation between at least one domain name and the domain name reported by the application program embedded point data can be configured, for example, if the domain name reported by the application program embedded point data is the domain name A, the corresponding relation between the domain name A and the domain names A, the domain name B and the domain name C can be preconfigured, and when any one of the domain names A, the domain names B and the domain names C of the network data packet transmitted by the packet capturing tool is required to copy the embedded point data in the network data packet, so that the embedded point data corresponding to the three domain names can be detected and analyzed one by one. For another example, if the domain name reported by the embedded point data of the application program is the domain name a, the corresponding relationship between the domain name a and the domain name a or the domain name B may be preconfigured, and accordingly, the embedding tool copies the embedded point data corresponding to the domain name a or the domain name B, which is not described again.
Optionally, step 102 includes: judging whether the domain name of the network data packet is consistent with the domain name reported by the embedded point data of the application program; if yes, copying the buried point data in the network data packet. Optionally, if the domain name of the network data packet is inconsistent with the domain name reported by the embedded point data of the application program, no additional processing is performed on the network data packet, and the original operation of the packet grabbing tool (such as Fiddler or Whistle) is continued. It should be noted that, in the embodiment of the present invention, the domain name reported by the embedded point data of the application program is the domain name of the on-line server, the application program reports the embedded point data to the on-line server, and when the domain names are consistent, the embodiment of the present invention copies the embedded point data in the network data packet and sends the embedded point data to the test server.
The capture tool (e.g., fiddler or Whistle, etc.) will record all the communications of the application program to the Internet, including some domain names reported by non-embedded point data, as shown in FIG. 2, the domain names of api.m.jd.com, img11.360 tunneling.com, etc. are all domain names reported by non-embedded point data, but all will be recorded in the capture tool. Therefore, in the embodiment of the invention, the network data packet is filtered through the domain name, and the network data packet consistent with the domain name reported by the embedded point data is screened, for example, the reported domain name of the embedded point data: mars.jd.com. Alternatively, as shown in fig. 2, the buried point data may include: apv, bld, page _ id, ela, eid, etc.
And step 103, detecting the buried data based on a dynamic rule base and generating a test report.
After the buried data are obtained, the buried data are automatically detected according to a dynamic rule base, and a test report is generated. Wherein the dynamic rule base comprises general rules and/or custom rules.
As shown in FIG. 3, the fields of the embedded point data in the requirements document may include a number of fields such as apv, bld, page _ id, ela, eid. Optionally, the implementation method of the general rule is specifically as follows: the fields of the buried point data in the requirement document are abstracted into general rules. For example: the type of buried point data (click, page view, exposure); whether the field of the buried point data is empty or not; and the number of spliced buried point data fields and the like, and generating corresponding general rules according to the fields of the buried point data in the requirement document, as shown in fig. 4. The universal rule has universality and wide applicability, so that only one part of the universal rule is needed to be generated, the universal rule can be repeatedly used, and the realization cost is relatively low.
Optionally, the implementation method of the custom rule is specifically as follows: buried point data in the demand document is shown in fig. 5. When the actual reported buried data has variability due to different scenes of the triggering application program, a regular expression is adopted for fields of the buried data to generate a custom rule. The custom rule is realized for a specific buried point data, so that the personalized requirement is met.
When the buried point data volume is huge, the universal rule is preferentially generated and used, and the custom rule is generated by using the regular expression only when the format of the buried point data has uncertainty. Therefore, the dynamic rule base saves cost and has the characteristics of flexibility and diversity. In the embodiment of the invention, the general rule can be generated, the custom rule can be generated, the dynamic rule base can comprise the general rule, the custom rule can be included, and the general rule and the custom rule can be simultaneously included.
Optionally, detecting the buried data based on a dynamic rule base includes: if the buried data accords with the general rule or the custom rule, the detection result is passed; if the buried data does not conform to the general rule and the custom rule, the detection result is failure, as shown in fig. 6-7.
According to the various embodiments described above, it can be seen that the invention copies the embedded point data in the network data packet according to the correspondence between the domain name of the network data packet and the domain name reported by the embedded point data of the application program, thereby solving the technical problems of low test efficiency and higher missing test rate in the prior art by using a technical means for detecting the embedded point data based on a dynamic rule base. According to the embodiment of the invention, the embedded point data in the network data packet is copied according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program, so that the additional operation of screening the network data packet is reduced, and the embedded point data of the application program can be automatically collected; and the buried point data is automatically detected according to the dynamic rule base, so that the manpower can be saved, the accuracy of buried point test is improved, and missing test is effectively avoided.
Fig. 8 is a schematic diagram of the main flow of a buried point testing method according to a reference embodiment of the present invention. The buried point testing method provided by the embodiment of the invention is mainly realized by the following steps:
Installing custom plug-ins in a bale plucker (Fiddler or Whistle, etc.);
The tester connects the terminal (such as a mobile phone, a tablet computer and the like) with the packet grabbing tool, and then triggers the application program to report the network data packet to the online server;
the custom plug-in monitors the domain name of the network data packet transmitted by the packet grasping tool, if the domain name of the network data packet is consistent with the domain name reported by the embedded point data of the application program, the embedded point data in the network data packet is copied, and the embedded point data is sent to a test server;
And the test server receives the buried point data, detects the buried point data according to a dynamic rule base and generates a test report.
In the embodiment of the invention, by installing the custom plug-in the packet grabbing tool, when a tester connects the packet grabbing tool with the application program and triggers the application program, the embedded point data can be automatically collected and reported to the test server. The test server contains a dynamic rule base (comprising general rules and custom rules), so that whether the embedded data is correct or not can be automatically detected according to the dynamic rule base, and a test report can be generated.
It is pointed out that the custom plug-in only needs to be developed to realize one copy, can be repeatedly used, and is low in learning cost, so that the tester does not need to perform additional operation, and is beneficial to popularization and use; the custom plug-in automatically monitors the embedded point data and sends the embedded point data to the test server, secondary transformation of the tested application is not needed, and the purpose of automatically collecting the embedded point data is achieved.
As can be seen from the above steps, the embedded point testing method provided by the embodiment of the invention can automatically collect embedded point data of an application program by using the custom plug-in and the seamless connection packet grasping tool, so that the steps of acquiring the embedded point data are reduced, and the testing time is saved; meanwhile, the test server generates a dynamic rule base according to the embedded point data demand document, and automatically carries out real-time and rapid consistency detection on the embedded point data reported by the application program, so that the labor cost for verifying the embedded point is reduced, and the accuracy of embedded point test is also improved.
Fig. 9 is a schematic diagram of the main flow of a buried point testing method according to another exemplary embodiment of the present invention.
Step 901, creating a dynamic rule base, specifically: abstracting fields of buried point data in a demand document into general rules; and/or, generating custom rules for the fields of the buried point data in the requirement document by adopting a regular expression.
In step 902, the domain name of the network data packet transmitted by the packet grasping tool is monitored.
Step 903, judging whether the domain name of the network data packet is consistent with the domain name reported by the embedded point data of the application program; if yes, go to step 904; if not, ending.
And step 904, copying the buried point data in the network data packet.
Step 905, detecting the buried data based on a dynamic rule base.
Step 906, a test report is generated.
According to the various embodiments described above, it can be seen that the invention copies the embedded point data in the network data packet according to the domain name of the network data packet and the domain name reported by the embedded point data of the application program, thereby solving the technical problems of low test efficiency and higher missing test rate in the prior art by using the technical means for detecting the embedded point data based on the dynamic rule base. According to the embodiment of the invention, the embedded point data in the network data packet is copied according to the domain name of the network data packet and the domain name reported by the embedded point data of the application program, so that the additional operation of screening the network data packet is reduced, and the embedded point data of the application program can be automatically collected; and the buried point data is automatically detected according to the dynamic rule base, so that the manpower can be saved, the accuracy of buried point test is improved, and missing test is effectively avoided.
Fig. 10 is a schematic diagram of main modules of a buried point testing apparatus according to an embodiment of the present invention, and as shown in fig. 10, the buried point testing apparatus 1000 includes a monitoring module 1001, a copying module 1002, and a testing module 1003. The monitoring module 1001 is configured to monitor a domain name of a network data packet transmitted by the packet capturing tool; the copying module 1002 is configured to copy the embedded point data in the network data packet according to a correspondence between the domain name of the network data packet and the domain name reported by the embedded point data of the application program; the test module 1003 is configured to detect the buried data based on a dynamic rule base and generate a test report.
Optionally, the copy module 1002 is further configured to:
Judging whether the domain name of the network data packet is consistent with the domain name reported by the embedded point data of the application program;
if yes, copying the buried point data in the network data packet.
Optionally, the dynamic rule base includes general rules and/or custom rules;
the test module is also used for:
before the buried point data is detected and a test report is generated based on a dynamic rule base, abstracting fields of the buried point data in the requirement document into general rules; and/or the number of the groups of groups,
And generating custom rules by adopting regular expressions for fields of buried point data in the demand document.
Optionally, the test module 1003 is further configured to:
If the buried data accords with the general rule or the custom rule, the detection result is passed;
If the buried data does not accord with the general rule and the custom rule, the detection result is failure.
According to the various embodiments described above, it can be seen that the invention copies the embedded point data in the network data packet according to the correspondence between the domain name of the network data packet and the domain name reported by the embedded point data of the application program, thereby solving the technical problems of low test efficiency and higher missing test rate in the prior art by using a technical means for detecting the embedded point data based on a dynamic rule base. According to the embodiment of the invention, the embedded point data in the network data packet is copied according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program, so that the additional operation of screening the network data packet is reduced, and the embedded point data of the application program can be automatically collected; and the buried point data is automatically detected according to the dynamic rule base, so that the manpower can be saved, the accuracy of buried point test is improved, and missing test is effectively avoided.
The embodiment of the buried point testing apparatus according to the present invention is described in detail in the buried point testing method described above, and thus the description thereof will not be repeated here.
Fig. 11 illustrates an exemplary system architecture 1100 to which the buried point testing method or apparatus of embodiments of the present invention may be applied.
As shown in fig. 11, system architecture 1100 may include terminal devices 1101, 1102, 1103, a network 1104, and a server 1105. Network 1104 is the medium used to provide communication links between terminal devices 1101, 1102, 1103 and server 1105. Network 1104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
A user may interact with the server 1104 via the network 1104 using the terminal devices 1101, 1102, 1103 to receive or transmit messages, etc. Various communication client applications such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, and the like (by way of example only) may be installed on terminal devices 1101, 1102, 1103.
The terminal devices 1101, 1102, 1103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 1105 may be a server that provides various services, such as a background management server (by way of example only) that provides support for shopping-type websites browsed by users using the terminal devices 1101, 1102, 1103. The background management server may analyze and process the received data such as the article information query request, and feedback the processing result (e.g., the target push information, the article information—only an example) to the terminal device.
It should be noted that, the method for testing a buried point according to the embodiment of the present invention is generally performed by the server 1105, and accordingly, the buried point testing device is generally disposed in the server 1105. The method for testing the buried point provided by the embodiment of the present invention may also be performed by the terminal devices 1101, 1102, 1103, and accordingly, the apparatus for testing the buried point may be provided in the terminal devices 1101, 1102, 1103.
It should be understood that the number of terminal devices, networks and servers in fig. 11 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 12, there is illustrated a schematic diagram of a computer system 1200 suitable for use in implementing an embodiment of the present invention. The terminal device shown in fig. 12 is only an example, and should not impose any limitation on the functions and the scope of use of the embodiment of the present invention.
As shown in fig. 12, the computer system 1200 includes a Central Processing Unit (CPU) 1201, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 1202 or a program loaded from a storage section 1208 into a Random Access Memory (RAM) 1203. In the RAM1203, various programs and data required for the operation of the system 1200 are also stored. The CPU 1201, ROM 1202, and RAM1203 are connected to each other through a bus 1204. An input/output (I/O) interface 1205 is also connected to the bus 1204.
The following components are connected to the I/O interface 1205: an input section 1206 including a keyboard, a mouse, and the like; an output portion 1207 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 1208 including a hard disk or the like; and a communication section 1209 including a network interface card such as a LAN card, a modem, or the like. The communication section 1209 performs communication processing via a network such as the internet. The drive 1210 is also connected to the I/O interface 1205 as needed. A removable medium 1211 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on the drive 1210 so that a computer program read out therefrom is installed into the storage section 1208 as needed.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network via the communication portion 1209, and/or installed from the removable media 1211. The above-described functions defined in the system of the present invention are performed when the computer program is executed by a Central Processing Unit (CPU) 1201.
The computer readable medium shown in the present invention may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer programs according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules involved in the embodiments of the present invention may be implemented in software or in hardware. The described modules may also be provided in a processor, for example, as: a processor includes a monitoring module, a copying module, and a testing module, where the names of the modules do not constitute a limitation on the module itself in some cases.
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be present alone without being fitted into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to include: monitoring the domain name of a network data packet transmitted by a packet grasping tool; copying the embedded point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program; and detecting the buried data based on a dynamic rule base and generating a test report.
According to the technical scheme provided by the embodiment of the invention, the embedded point data in the network data packet is copied by adopting the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program, so that the technical means of detecting the embedded point data based on the dynamic rule base is adopted, and the technical problems of low test efficiency and higher missing test rate in the prior art are solved. According to the embodiment of the invention, the embedded point data in the network data packet is copied according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program, so that the additional operation of screening the network data packet is reduced, and the embedded point data of the application program can be automatically collected; and the buried point data is automatically detected according to the dynamic rule base, so that the manpower can be saved, the accuracy of buried point test is improved, and missing test is effectively avoided.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives can occur depending upon design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (6)

1. A buried point testing method, comprising:
Monitoring the domain name of a network data packet transmitted by a packet grasping tool;
Copying the embedded point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program;
detecting the buried data based on a dynamic rule base and generating a test report;
The dynamic rule base comprises general rules and/or custom rules;
before the buried data is detected and the test report is generated based on the dynamic rule base, the method further comprises the following steps:
abstracting fields of buried point data in a demand document into general rules; and/or the number of the groups of groups,
Generating a custom rule by adopting a regular expression for fields of buried point data in the demand document;
Detecting the buried data based on a dynamic rule base, including:
If the buried data accords with the general rule or the custom rule, the detection result is passed;
If the buried data does not accord with the general rule and the custom rule, the detection result is failure.
2. The method of claim 1, wherein copying the embedded point data in the network data packet according to a correspondence between the domain name of the network data packet and the domain name reported by the embedded point data of the application program, comprises:
Judging whether the domain name of the network data packet is consistent with the domain name reported by the embedded point data of the application program;
if yes, copying the buried point data in the network data packet.
3. A buried point testing apparatus, comprising:
the monitoring module is used for monitoring the domain name of the network data packet transmitted by the packet grabbing tool;
The copying module is used for copying the embedded point data in the network data packet according to the corresponding relation between the domain name of the network data packet and the domain name reported by the embedded point data of the application program;
The test module is used for detecting the buried data based on a dynamic rule base and generating a test report;
The dynamic rule base comprises general rules and/or custom rules;
the test module is also used for:
Before the buried data is detected and a test report is generated based on a dynamic rule base,
Abstracting fields of buried point data in a demand document into general rules; and/or the number of the groups of groups,
Generating a custom rule by adopting a regular expression for fields of buried point data in the demand document;
the test module is also used for:
If the buried data accords with the general rule or the custom rule, the detection result is passed;
If the buried data does not accord with the general rule and the custom rule, the detection result is failure.
4. The apparatus of claim 3, wherein the copy module is further to:
Judging whether the domain name of the network data packet is consistent with the domain name reported by the embedded point data of the application program;
if yes, copying the buried point data in the network data packet.
5. An electronic device, comprising:
One or more processors;
Storage means for storing one or more programs,
The one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of claim 1 or 2.
6. A computer readable medium on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to claim 1 or 2.
CN201911052577.6A 2019-10-31 2019-10-31 Buried point testing method and device Active CN112749078B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911052577.6A CN112749078B (en) 2019-10-31 2019-10-31 Buried point testing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911052577.6A CN112749078B (en) 2019-10-31 2019-10-31 Buried point testing method and device

Publications (2)

Publication Number Publication Date
CN112749078A CN112749078A (en) 2021-05-04
CN112749078B true CN112749078B (en) 2024-06-18

Family

ID=75644580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911052577.6A Active CN112749078B (en) 2019-10-31 2019-10-31 Buried point testing method and device

Country Status (1)

Country Link
CN (1) CN112749078B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113360376A (en) * 2021-06-01 2021-09-07 北京沃东天骏信息技术有限公司 Buried point testing method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107832210A (en) * 2017-10-27 2018-03-23 广州四三九九信息科技有限公司 Access method of testing, device and a server are buried in daily record
CN107992506A (en) * 2016-10-27 2018-05-04 北京京东尚科信息技术有限公司 Information processing method and device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915296B (en) * 2015-06-29 2018-07-10 北京金山安全软件有限公司 Buried point testing method, data query method and device
CN106708899B (en) * 2015-11-17 2021-04-27 阿里巴巴集团控股有限公司 Automatic point burying method and device
CN106528432B (en) * 2016-12-12 2019-01-25 北京三快在线科技有限公司 Construction method and device of test scene data, and buried point test method
CN107870860B (en) * 2017-05-05 2020-12-15 平安科技(深圳)有限公司 Buried point verification system and method
US10216621B1 (en) * 2017-11-16 2019-02-26 Servicenow, Inc. Automated diagnostic testing of databases and configurations for performance analytics visualization software
CN107995266A (en) * 2017-11-22 2018-05-04 平安科技(深圳)有限公司 Bury point data processing method, device, computer equipment and storage medium
CN109840157A (en) * 2017-11-28 2019-06-04 中国移动通信集团浙江有限公司 Method, apparatus, electronic equipment and the storage medium of fault diagnosis
CN108319552A (en) * 2018-02-07 2018-07-24 优信数享(北京)信息技术有限公司 One kind burying a test method, apparatus and system
CN109960651A (en) * 2019-02-13 2019-07-02 北京达佳互联信息技术有限公司 Bury a test method, system, device and computer readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992506A (en) * 2016-10-27 2018-05-04 北京京东尚科信息技术有限公司 Information processing method and device
CN107832210A (en) * 2017-10-27 2018-03-23 广州四三九九信息科技有限公司 Access method of testing, device and a server are buried in daily record

Also Published As

Publication number Publication date
CN112749078A (en) 2021-05-04

Similar Documents

Publication Publication Date Title
CN110858172B (en) A method and device for generating automatic test code
CN110798445B (en) Public gateway interface testing method and device, computer equipment and storage medium
CN110851471B (en) Distributed log data processing method, device and system
CN111435393B (en) Object vulnerability detection method, device, medium and electronic equipment
CN110737891B (en) Host intrusion detection method and device
CN104834588B (en) The method and apparatus for detecting resident formula cross site scripting loophole
US10540325B2 (en) Method and device for identifying junk picture files
CN107644075B (en) Method and device for collecting page information
CN113360376A (en) Buried point testing method and device
CN109218041B (en) Request processing method and device for server system
CN107368407B (en) Information processing method and device
CN112749078B (en) Buried point testing method and device
CN109522202B (en) Software testing method and device
CN112306826B (en) Method and device for processing information in terminal
CN112860538B (en) Method and device for carrying out interface regression test based on online log
CN112988560B (en) Method and device for testing system robustness
CN112445697B (en) Method and apparatus for testing applications
CN113448827B (en) A method and device for processing test data
CN113760564B (en) Data processing method, device and system
CN113626301B (en) Method and device for generating test script
CN111352742B (en) APP-based componentization information transmission method and apparatus
CN112732471B (en) Error correction method and error correction device for interface return data
CN109756393B (en) Information processing method, system, medium, and computing device
CN114285774A (en) Flow recording method and device, electronic equipment and storage medium
CN113254325A (en) Test case processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant