[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN118394642A - Verification method and device - Google Patents

Verification method and device Download PDF

Info

Publication number
CN118394642A
CN118394642A CN202410551456.0A CN202410551456A CN118394642A CN 118394642 A CN118394642 A CN 118394642A CN 202410551456 A CN202410551456 A CN 202410551456A CN 118394642 A CN118394642 A CN 118394642A
Authority
CN
China
Prior art keywords
test
idempotent
rule
user
object processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410551456.0A
Other languages
Chinese (zh)
Inventor
郭林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang eCommerce Bank Co Ltd
Original Assignee
Zhejiang eCommerce Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang eCommerce Bank Co Ltd filed Critical Zhejiang eCommerce Bank Co Ltd
Priority to CN202410551456.0A priority Critical patent/CN118394642A/en
Publication of CN118394642A publication Critical patent/CN118394642A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3692Test management for test results analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the specification provides a verification method and a verification device, wherein the method comprises the steps that a test center displays a rule configuration interface for a first user under the condition that a rule configuration request of the first user is received, generates a test rule based on editing operation of the first user on the rule configuration interface, and sends the test rule to a corresponding application server; the application server receives an object processing request of a second user, performs first processing on the object processing request under the condition that the object processing request meets the test rule, acquires first processing information, performs second processing on the object processing request after the first processing of the object processing request is completed, acquires second processing information, performs idempotent verification on the object processing request based on the first processing information and the second processing information, and sends an idempotent verification result to the test center.

Description

Verification method and device
The application relates to a divisional application with the name of verification method and device, which is applied for the application number 202110368386.1, the application date 2021, the year 04 and the month 06.
Technical Field
The embodiment of the specification relates to the technical field of computers, in particular to three verification methods. One or more embodiments of the present specification relate to an authentication system, two types of authentication apparatuses, a computing device, and a computer-readable storage medium.
Background
Idempotent is that the influence generated by any multiple execution of one operation is the same as that of one execution, and in practical application, idempotent test is applied to various fields, especially to the field of fund transfer, if one fund transfer cannot realize idempotent, multiple fund deductions can be generated by one transaction operation, and huge loss can be brought to a user, so that the idempotent test on processing requests is particularly important.
At present, under the field of idempotent, no good test scheme exists before, the idempotent verification is basically carried out by manual work, the idempotent verification efficiency is lower, and the labor cost is higher.
Disclosure of Invention
In view of this, the present specification embodiments provide three verification methods. One or more embodiments of the present specification are also directed to an authentication system, two authentication apparatuses, a computing device, and a computer-readable storage medium that address the technical shortcomings of the prior art.
According to a first aspect of embodiments of the present specification, there is provided a verification method, including:
The test center displays a rule configuration interface for a first user under the condition of receiving a rule configuration request of the first user, and
Generating a test rule based on the editing operation of the first user on the rule configuration interface, and sending the test rule to a corresponding application server;
The application server receives an object processing request of a second user, performs a first processing on the object processing request and acquires first processing information if the object processing request is determined to satisfy the test rule, and
And after the first processing of the object processing request is finished, performing second processing on the object processing request, acquiring second processing information, performing idempotent verification on the object processing request based on the first processing information and the second processing information, and sending an idempotent verification result to the test center.
According to a second aspect of embodiments of the present specification, there is provided a verification system comprising: test center and application server, wherein:
the test center is configured to present a rule configuration interface for a first user upon receiving a rule configuration request of the first user, and
Generating a test rule based on the editing operation of the first user on the rule configuration interface, and sending the test rule to a corresponding application server;
The application server is configured to receive an object processing request of a second user, perform a first processing on the object processing request and acquire first processing information if it is determined that the object processing request satisfies the test rule, and
And after the first processing of the object processing request is finished, performing second processing on the object processing request, acquiring second processing information, performing idempotent verification on the object processing request based on the first processing information and the second processing information, and sending an idempotent verification result to the test center.
According to a third aspect of embodiments of the present specification, there is provided a verification method, applied to a test center, including:
Under the condition that a rule configuration request of a first user is received, a rule configuration interface is displayed for the first user;
and generating a test rule based on the editing operation of the first user on the rule configuration interface, and sending the test rule to a corresponding application server.
According to a fourth aspect of embodiments of the present specification, there is provided an authentication method, applied to an application server, including:
receiving an object processing request of a second user, and under the condition that the object processing request meets a test rule, performing first processing on the object processing request and acquiring first processing information;
after the first processing of the object processing request is completed, performing second processing on the object processing request, and acquiring second processing information;
Performing idempotent verification on the object processing request based on the first processing information and the second processing information, and sending an idempotent verification result to a test center;
The test rule is generated based on the editing operation of the first user on the rule configuration interface and sent by the test center.
According to a fifth aspect of embodiments of the present specification, there is provided a verification apparatus, for use in a test center, comprising:
the interface display module is configured to display a rule configuration interface for a first user under the condition that a rule configuration request of the first user is received;
and the rule sending module is configured to generate a test rule based on the editing operation of the first user on the rule configuration interface and send the test rule to a corresponding application server.
According to a sixth aspect of embodiments of the present specification, there is provided an authentication apparatus applied to an application server, including:
The first processing module is configured to receive an object processing request of a second user, and perform first processing on the object processing request and acquire first processing information under the condition that the object processing request meets a test rule;
The second processing module is configured to perform second processing on the object processing request after the first processing of the object processing request is completed, and acquire second processing information;
An idempotent verification module configured to perform idempotent verification on the object processing request based on the first processing information and the second processing information, and send an idempotent verification result to a test center;
The test rule is generated based on the editing operation of the first user on the rule configuration interface and sent by the test center.
According to a seventh aspect of embodiments of the present specification, there is provided a computing device comprising:
A memory and a processor;
the memory is configured to store computer-executable instructions that, when executed by the processor, perform the steps of the verification method.
According to an eighth aspect of embodiments of the present specification, there is provided a computer-readable storage medium storing computer-executable instructions which, when executed by a processor, implement the steps of the authentication method.
One embodiment of the specification provides a verification method, which comprises the steps that a test center displays a rule configuration interface for a first user under the condition that a rule configuration request of the first user is received, generates a test rule based on editing operation of the first user on the rule configuration interface, and sends the test rule to a corresponding application server; the application server receives an object processing request of a second user, performs first processing on the object processing request under the condition that the object processing request meets the test rule, acquires first processing information, performs second processing on the object processing request after the first processing of the object processing request is completed, acquires second processing information, performs idempotent verification on the object processing request based on the first processing information and the second processing information, and sends an idempotent verification result to the test center. Specifically, the method only needs to receive a scheme of a test engineer for performing idempotent tests in a test center, configure related test rules, and send the configured test rules to an application server, the subsequent application server automatically monitors all object processing requests for performing the idempotent tests based on the test rules in a daily environment, performs idempotent evaluation on the object processing requests for performing the idempotent tests, returns failure results of the idempotent evaluation to the test center, and sends the failure results of the idempotent evaluation to the corresponding test engineer for subsequent idempotent test update.
Drawings
FIG. 1 is a flow chart of a verification method provided by one embodiment of the present description;
FIG. 2 is a schematic diagram of a rule configuration interface in a verification method according to one embodiment of the present disclosure;
FIG. 3 is a schematic diagram of reverse configuration of data of a rule configuration interface in a verification method according to an embodiment of the present disclosure;
FIG. 4 is a schematic diagram of an idempotent verification results interface in a verification method according to one embodiment of the present disclosure;
FIG. 5 is a statistical schematic diagram of idempotent verification results in a verification method according to one embodiment of the present disclosure;
FIG. 6 is a flowchart showing a specific interaction between a test center and an application server in a verification method according to an embodiment of the present disclosure;
FIG. 7 is a flow chart of a verification method applied to a test center provided in one embodiment of the present disclosure;
FIG. 8 is a flow chart of a verification method applied to an application server provided in one embodiment of the present disclosure;
FIG. 9 is a schematic diagram of a specific process of an authentication method applied to an application server according to an embodiment of the present disclosure;
FIG. 10 is a schematic diagram of a verification system according to one embodiment of the present disclosure;
FIG. 11 is a schematic structural view of a verification device applied to a test center according to an embodiment of the present disclosure;
fig. 12 is a schematic structural diagram of an authentication apparatus applied to an application server according to an embodiment of the present disclosure;
FIG. 13 is a block diagram of a computing device provided in one embodiment of the present description.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present description. This description may be embodied in many other forms than described herein and similarly generalized by those skilled in the art to whom this disclosure pertains without departing from the spirit of the disclosure and, therefore, this disclosure is not limited by the specific implementations disclosed below.
The terminology used in the one or more embodiments of the specification is for the purpose of describing particular embodiments only and is not intended to be limiting of the one or more embodiments of the specification. As used in this specification, one or more embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that, although the terms first, second, etc. may be used in one or more embodiments of this specification to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first may also be referred to as a second, and similarly, a second may also be referred to as a first, without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination" depending on the context.
First, terms related to one or more embodiments of the present specification will be explained.
Java: a portal is oriented to the programming language of the object.
The Java method comprises the following steps: the collection of Java statements required for project processing is completed.
Java jar packet: java archive files are a collection of many Java classes and methods.
Idempotent: the effect of an operation on any number of executions is the same as that of an execution.
Idempotent point: in this specification, a Java method having idempotent characteristics is specified.
Idempotent links: processing links within the Java method where idempotent points are located.
RESULT: the present specification refers specifically to the execution result of the Java method.
RPC: remote procedure call, a way of inter-process communication.
DB: a database for persisting a repository of stored data.
MSG: message, a way of data transfer.
Idempotent ID: the request single number has uniqueness, and the request execution with unchanged single number needs to satisfy idempotent.
Persistence data: the data stored in the permanently stored equipment, in this scheme, refers in particular to the data that has an influence on the subsequent project processing, such as database data, externally sent message data, input and output data of the method, and data stored in the cache.
Idempotent test Agent: the special jar packet for the idempotent test internally comprises execution logic of the idempotent test, and is required to be put into a Java process of the tested application during use.
Idempotent test center: unified management idempotent testing is a platform device.
Idempotent rule: a piece of data defined by the user in the device is used to describe an idempotent test content.
Idempotent is a very important point in the funding project processing of distributed applications. Idempotent is not done, light affects customers, and heavy causes resource loss. In design, for the scene requiring idempotent, the same idempotent ID is consistent in result no matter how many times the same idempotent ID is requested, and finally, only one item processing is carried out.
For example, in a certain fund-releasing flow link of a bank, the idempotent ID of the fund-releasing flow link is unchanged no matter how many times of retries are caused by abnormality in the bank, and finally only one fund flow is carried out, namely only one fund is released.
Currently, applications are really idempotent and need to be known after verification by test engineers. At present, the test verification for idempotent cannot continuously return, and the test verification is manually performed in the test process. According to the idempotent principle, a test engineer manually creates an idempotent ID unchanged request, continuously initiates a plurality of times, and finally checks whether project processing is initiated once or not. This verification process has two difficulties:
The first scene is difficult to construct: two requests are initiated manually, which is done by means of special tools, whereas daily tools are rarely designed for idempotent testing.
The second result is difficult to verify: all of the persistent data needs to be verified, which requires the test engineer to be familiar with the project process and be able to obtain all of the persistent data to do so, otherwise omission is likely to occur.
Based on this, in the present specification, three verification methods are provided. One or more embodiments of the present specification relate to an authentication system, two authentication apparatuses, a computing device, and a computer-readable storage medium, which are described in detail in the following embodiments.
Referring to fig. 1, fig. 1 shows a flowchart of a verification method according to an embodiment of the present disclosure, which specifically includes the following steps.
Step 102: and under the condition that the test center receives the rule configuration request of the first user, a rule configuration interface is displayed for the first user, test rules are generated based on the editing operation of the first user on the rule configuration interface, and the test rules are sent to the corresponding application server.
Step 104: the application server receives an object processing request of a second user, performs first processing on the object processing request under the condition that the object processing request meets the test rule, acquires first processing information, performs second processing on the object processing request after the first processing of the object processing request is completed, acquires second processing information, performs idempotent verification on the object processing request based on the first processing information and the second processing information, and sends an idempotent verification result to the test center.
In the application of the verification method in an idempotent test scene of an application, a test center can be understood as an idempotent test center, and an application server can be understood as a server capable of performing any application processing, such as an application for performing funds transfer in and out, a goods order processing application and the like.
Furthermore, the first user may be understood as a test engineer, i.e. a user performing an idempotent test configuration at an idempotent test center; the second user may be understood as a user sending an object processing request to the application server, the object may be understood as an event to be executed, and the first user and the second user may be the same user or different users, and specifically, the setting is performed according to an actual application, which is not limited in any way in the embodiment of the present specification.
Specifically, under the condition that a rule configuration request of a first user is received, a test center displays a rule configuration interface for the first user, generates a test rule based on editing operation of the first user on the rule configuration interface, and sends the test rule to a corresponding application server; the idempotent test center can be understood to display a rule configuration interface for the test engineer under the condition that the rule configuration request of the idempotent test rule of the test engineer is received, so that the test engineer can perform idempotent test rule configuration on the rule configuration interface; after the rule configuration interface is displayed to the test engineer, the test center receives idempotent rule configuration performed by the test engineer on the rule configuration interface in the operation modes of selection, clicking or input and the like so as to generate idempotent test rules, and sends the generated idempotent test rules to the corresponding application servers.
In practical application, the number of the first users is at least one, that is, the test center can receive rule configuration requests of a plurality of first users at the same time, and can send each test rule to a corresponding application server based on a plurality of test rules generated by editing operations of the plurality of first users on the rule configuration interface.
After receiving the test rule sent by the test center, the application server judges whether the object processing request meets the test rule or not under the condition that the object processing request of a second user is received, if yes, the application server performs first processing on the object processing request and acquires first processing information, and after the first processing of the object processing request is completed, performs second processing on the object processing request and acquires second processing information; and then performing idempotent verification on the object processing request based on the first processing information and the second processing information, and sending an idempotent verification result to a test center.
Wherein, the object processing request can be understood as a processing request for a certain event, such as a loan request for a certain fund; the first processing of the object processing request may be understood as the first execution of the object processing request, and the first processing information may be understood as data that is affected during the first execution of the object processing request, i.e. persistent data, such as, for example, the streaming data generated by the object processing request, database data storing the streaming data, other interface data of the call, etc.; then the second processing of the object processing request may be understood as a second execution of the object processing request, and the second processing information may be understood as data affected during the second execution of the object processing request, i.e. persistent data.
In practical application, the application server monitors all traffic of the daily environment in real time (i.e. the object processing request of the above embodiment), if it is determined based on the test rule that the traffic entry has been set as an idempotent point, i.e. traffic requiring an idempotent test, then traffic recording is used to record data affected during the execution of the idempotent method, where the data may be referred to as basic data (i.e. the first processing information), and immediately after the execution of the idempotent method is completed, the same data is used to initiate a recall of the idempotent method, and execute a process again, and at the same time, perform again the data affected during the execution of the traffic recording, where the data may be referred to as test data (i.e. the second processing information); and then performing idempotent verification on the object processing request by the basic data and the test data, and transmitting an idempotent verification result to a test center.
In a specific implementation, the sending the test rule to the corresponding application server includes:
And sending the test rule to an application server corresponding to the application attribute information based on the application attribute information edited by the first user in the rule configuration interface in the test rule.
The application attribute information includes, but is not limited to, the name, type, etc. of the application server.
Taking application attribute information as an example of the name of the application server, the test rule includes a corresponding name of the application server, and after the test center generates the test rule, the test center sends the test rule to the corresponding application server based on the name of the application server in the test rule.
In the embodiment of the specification, the test rules can be accurately issued to the corresponding application servers through the application attribute information in the test rules, and only the test rules corresponding to the application servers are stored in the application servers, so that redundancy of the test rules is avoided.
In practical application, when receiving an object processing request, an application server is to determine whether a traffic entry of the object processing request is configured in a test rule, that is, whether the traffic entry is an idempotent point, if so, further performing verification whether the traffic entry meets the idempotent test rule, and if not, not performing verification whether the traffic entry meets the idempotent test rule, which is specifically described as follows:
the determining that the object handling request satisfies the test rule includes:
Determining a flow entry and attribute information corresponding to the object processing request, and determining that the object processing request meets the test rule when the flow entry corresponding to the object processing request is consistent with the flow entry edited by the first user in the rule configuration interface in the test rule and the attribute information corresponding to the object processing request is consistent with the attribute information edited by the first user in the rule configuration interface in the test rule.
The flow entry may be understood as a specific application interface selected by a user in the application server, for example, the application server is a shopping program server, and then the flow entry may be understood as a goods delivery application interface or a fund collection interface in the application server.
The attribute information includes, but is not limited to, a full class name, a method name, and the like, corresponding to the object processing request.
Specifically, the application server first determines whether the traffic entry corresponding to the received object processing request is matched based on the idempotent point set in the test rule, that is, the traffic entry, and if so, determines whether the object processing request meets the test rule, and performs idempotent verification.
In addition, since there are a plurality of test contents in the test rule, there are a plurality of methods for determining whether the object processing request needs to be subjected to the idempotent test by the application server based on the test rule, and in the embodiment of the present disclosure, a detailed explanation is given by taking one example, but it is not limited that the application server may use other test contents to determine whether the object processing request needs to be subjected to the idempotent test, and the method is as follows:
Determining a full class name and a method name corresponding to the object processing request;
and under the condition that the full class name and the method name corresponding to the object processing request are consistent with the full class name and the method name compiled by the first user in the rule configuration interface in the test rule, determining that the object processing request needs idempotent verification.
Each object processing request is called and processed by a different method in the application server, wherein the method consists of a full class name, a method name and other parameters.
In practical application, after receiving an object processing request, an application server determines a full class name and a method name corresponding to the object processing request, compares the full class name and the method name with a full class name and a method name edited by a first user in a rule configuration interface in a test rule, and under the condition that the comparison result is consistent, the application server can determine that the object processing request meets the test rule, namely the object processing request needs to be subjected to idempotent test.
In the embodiment of the specification, the application server can quickly and accurately determine whether the object processing request needs to be subjected to the idempotent test based on the test rule by matching the full class name and the method name corresponding to the object processing request with the full class name and the method name edited by the first user in the rule configuration interface in the test rule.
Referring to fig. 2, fig. 2 is a schematic diagram of a rule configuration interface in a verification method according to an embodiment of the present disclosure.
As can be seen from fig. 2, the rule configuration interface includes at least rule names, applicable applications, full class names, method names, parameter types, application general ignore configurations, basic configurations, condition scripts, return to contrast configurations, DB operation contrast configurations, and the like.
The first user may edit the rule configuration interface by inputting, selecting, etc. the rule configuration interface to generate an idempotent test rule via the edited rule configuration interface.
When the method is specifically used, the test center can determine the application server corresponding to the test rule through the application suitable for the test center in fig. 2, so as to realize the distribution of the test rule to the application server.
When the test rule includes the full class name and the method name, the application server can compare the full class name and the method name corresponding to the object processing request with the full class name and the method name in the test rule to determine whether to perform an idempotent test on the object processing request; in practical application, since other test items, such as parameter types, exist in the rule configuration interface, the application server may also compare with the test rule according to other parameters in the object processing request to determine whether to perform an idempotent test on the object processing request, for example, compare the parameter types in the object processing request with the parameter types in the test object to determine whether to perform an idempotent test on the object processing request. The setting can be specifically performed according to practical applications, and is not limited in any way.
And may also set a delay time, a test time limit, etc. for the test rules according to the rule configuration interface.
In another embodiment of the present disclosure, the performing idempotent verification on the object processing request based on the first processing information and the second processing information includes:
comparing the first processing information with the second processing information, and determining an idempotent verification result of the object processing request based on the comparison result of the first processing information and the second processing information.
Specifically, the application server performs execution processing on the object processing request based on the test rule, and the first user pre-configures in the test rule which parameters are acquired when the object processing request is executed, that is, which first processing information and second processing information are acquired, so that the application server performs first processing and second processing on the object processing request, and the acquired first processing information and second processing information are information specified in the test rule.
Referring to fig. 3, fig. 3 is a schematic diagram illustrating reverse configuration of data of a rule configuration interface in a verification method according to an embodiment of the present disclosure.
FIG. 3 is a database operation comparison configuration in which test rules for data operations set for a first user are ignored for fields, no context consistency comparison is performed subsequently, and other data is subject to context consistency comparison except for these. That is, the fields in the configuration are not used as the first processing information and the second processing information, and the front-back consistency comparison is performed. In this way, reverse configuration of test data is achieved.
In practical application, after the application server executes twice processing on the object processing request, respectively obtaining the first processing information and the second processing information, comparing the consistency of the two processing information, and then taking the comparison result as an idempotent verification result of the object processing request, namely, the two processing information are consistent, which indicates that the idempotent verification result of the object processing request is successful, the idempotent test of the application server has no problem, and the two processing information are inconsistent, which indicates that the idempotent verification result of the object processing request fails, and the follow-up idempotent test of the application server needs to be adjusted.
For example, the first processing information includes only one piece of data in the database, and the second processing information includes two pieces of data in the database, so that it can be stated that the object processing request is one more running water in the database when being executed, and then when the actual project processing is performed, the situation that two money or two objects are deducted may occur, so that it is stated that the application server fails to perform the idempotent test on the object processing request, and then a test engineer needs to perform program adjustment on the application server to achieve the idempotent property.
In the embodiment of the specification, reverse configuration is adopted for the data range of the idempotent evaluation, namely the idempotent data is evaluated for idempotent unless the execution displayed by a user is not evaluated, so that the idempotent data is colloquially understood to be that the fields displayed in the rule configuration interface are not evaluated, and the other fields are all evaluated as processing information, so that the condition of field omission is avoided when the idempotent test occurs, and the accuracy of the idempotent test is ensured.
Furthermore, the sending the idempotent verification result to the test center includes:
and sending the idempotent verification result of the object processing request to the test center according to a preset time interval.
The preset time interval may be set according to actual requirements, which is not limited in this embodiment of the present disclosure, for example, set to 5 seconds or 10 seconds.
Specifically, the application server may perform idempotent verification on a plurality of object processing requests sent by a plurality of second users at the same time, or may perform idempotent verification on an object processing request sent by one second user at the same time, if the application server performs idempotent verification once, the idempotent verification result is sent to the test center, frequent interaction between the application server and the test center is caused, and downtime of the application server is easily caused, so that a preset time interval is set, all idempotent verification results in the time interval are uniformly sent to the test center by the application server every 5 seconds or 10 seconds, so that the processing flow of the application server is saved, and frequent interaction between the application server and the test center is avoided.
In another embodiment of the present specification, the method further comprises:
And the test center analyzes the received idempotent verification result of the object processing request, and sends a result checking notification to a third user corresponding to the object processing request when determining that the idempotent verification result of the object processing request fails.
Specifically, after receiving an idempotent verification result of an object processing request sent by an application server, a test center divides the idempotent verification result of the object processing request with a successful idempotent verification result and the idempotent verification result of a failed object processing request, then sends a result checking notification to a third user corresponding to the object processing request with failed verification results, for example, prompts the corresponding third user to check the result of failed idempotent verification result of the object processing request in a mail, short message or popup window reminding mode, searches for a failure reason based on the failure result in time, and repairs the application server. The third user may be the same as or different from the first user, which is not limited in this embodiment of the present disclosure.
In a specific implementation, after the idempotent verification result is sent to the test center, the method further includes:
And the test center receives a viewing request of a fourth user for an idempotent verification result of the object processing request, and displays an idempotent verification result interface of the object processing request to the fourth user based on the viewing request.
Specifically, after the test center sends the idempotent verification result of the object processing request to the test center, a check request of the fourth user for the idempotent verification result of the object processing request can be received, and the idempotent verification result of the object processing request is displayed to the fourth user based on the check request, wherein the fourth user can be a third user receiving a result check notification or other users who want to check the idempotent verification result.
Referring to fig. 4, fig. 4 is a schematic diagram of an idempotent verification result interface in a verification method according to an embodiment of the present disclosure.
Under the condition that the test center receives a viewing request of the fourth user for the idempotent verification result of the object processing request, an idempotent verification result interface of the object processing request, namely a display interface in fig. 4, is displayed for the fourth user based on the viewing request, and names, failure versions, belonging applications, source information, failure reasons, failure positions and the like of test rules corresponding to the object processing request can be seen through the display interface, so that a test engineer can update programs of an application server based on information acquired in the display interface, and the idempotent property of the application server is guaranteed.
In another embodiment of the present disclosure, after the sending the idempotent verification result to the test center, the method further includes:
And under the condition that the test center receives the result checking request of the fourth user, counting idempotent verification results of all object processing requests in a time interval based on the time interval carried in the result checking request, and displaying the idempotent verification results to the fourth user in a picture and text mode.
The first user, the second user, the third user and the fourth user can be the same user, different users or users with user crossing.
The test center provides a statistical map of the idempotent verification results of all application servers, which may be a bar graph, a line graph, a wave graph, or the like, through which a user can see the idempotent verification results of the application servers over a period of time.
Specifically, under the condition that a test center receives a result checking request of a user, based on a time interval carried in the result checking request, the idempotent verification results of all object processing requests in the time interval are counted, and then the idempotent verification results are displayed to the user in a graphic form.
Referring to fig. 5, fig. 5 shows a statistical schematic diagram of idempotent verification results in a verification method according to an embodiment of the present disclosure.
In the case that the test center receives the result viewing request of the fourth user, the idempotent verification result interface of all object processing requests, that is, the display interface in fig. 5, is displayed for the fourth user based on the viewing request, the trend of the idempotent verification results of all object processing requests in the time interval can be seen through the display interface 20210107-20210114, and the statistical situation of the idempotent verification results of all object processing requests in a certain day can be displayed by clicking a certain broken line point through a mouse, for example, after clicking 20210112 in fig. 5, the total amount, the successful amount, the failure amount, the RPC call amount, the DB operation amount, the message sending amount and the like of the idempotent verification results of all object processing requests in a 20210112 day are displayed in the upper right corner of fig. 5. Through the graphic interface in fig. 5, the condition of the idempotent verification result of the object processing request in a period of time can be clearly and accurately obtained.
According to the verification method provided by the embodiment of the specification, only a scheme requiring idempotent testing is required to be appointed by a test engineer in a test center, related test rules are configured, the configured test rules are sent to an application server, the subsequent application server automatically monitors all object processing requests requiring idempotent testing based on the test rules in a daily environment, the object processing requests requiring idempotent testing are subjected to idempotent evaluation, failure results of the idempotent evaluation are returned to the test center, the test center sends the failure results to the corresponding test engineer, subsequent idempotent testing update is performed, the idempotent testing process can be completed efficiently in the mode, excessive human intervention is not required, and labor cost is saved.
Referring to fig. 6, fig. 6 shows a specific interaction flow diagram of a test center and an application server in a verification method according to an embodiment of the present disclosure.
Taking a test center as an idempotent test center, and introducing the verification method by taking an example that the application server comprises an application server A to be tested and an application server B to be tested.
The idempotent test center comprises a rule management module, a rule synchronization module, a result collection module, a customer touch module and the like, and the test engineer A and the test engineer B are both used for carrying out rule configuration based on the rule management module of the idempotent test center to configure idempotent test rules; and the rule synchronization module of the test center distributes idempotent test rules configured by the test engineer A and the test engineer B through the rule management module to the application server A to be tested and the application server B to be tested, wherein the application server A to be tested and the application server B to be tested respectively comprise flow monitoring, idempotent evaluation, result synchronization and state monitoring modules.
Specifically, the specific processing modes of the application server a to be tested and the application server B to be tested are the same, so that only idempotent verification and interaction with an idempotent test center of the application server a to be tested are taken as examples for explanation in detail.
The flow monitoring module of the application server A to be tested monitors the flow (namely, application processing request) in real time, under the condition that the flow is monitored, the idempotent evaluation module matches the flow with the idempotent test rule issued by the idempotent test center, if the matching is successful, the idempotent test is carried out on the flow, then the idempotent test result is transmitted back to the idempotent test center through the result synchronization module, the result collection module of the idempotent test center collects the idempotent test results transmitted back by all the application servers to be tested, and then the flow which fails in the idempotent test result is transmitted to the corresponding test engineer through the passenger touch module, so that the whole idempotent test flow is completed.
In specific implementation, the idempotent test center is used for interacting with a test engineer, and the test engineer can add, modify, delete and inquire corresponding idempotent test rules in the idempotent test center, and receive, edit and view idempotent test statistical data. The idempotent test Agent (i.e. the application server to be tested) is a place where the idempotent test rule is analyzed and executed, and the idempotent test Agent is a Javajar packet, and is required to be loaded into a Java process where an idempotent point is located when in use.
The verification method of the embodiment of the specification is innovative in that a unified idempotent test method which can be intuitively used by a user is provided. The user can directly carry out idempotent test rule configuration through the idempotent test center, then uniformly distributes the idempotent test rule configuration to all servers of the application to be tested, automatically monitors flow, automatically constructs the idempotent flow, automatically collects data and evaluates idempotent property, finally shows the complete execution result to the user, and besides the configuration rule, the user does not need other operations, so that user experience is improved.
In practical application, the verification method includes interaction between an idempotent test center and an idempotent test Agent, and the execution flow of the whole method can be seen from top to bottom in fig. 6:
Firstly, a test engineer defines and confirms idempotent points according to quality requirements, and a corresponding idempotent test rule is configured in an idempotent test center. The rules mainly relate to the following parts:
1. Idempotent point: java method, which will act as traffic monitoring point, initiates a test once traffic (i.e. a request) occurs.
2. Basic configuration: and the pre-condition of flow identification is met, and then an idempotent test is initiated.
3. Comparison configuration: the reverse configuration is mainly adopted, namely the fields which are ignored in the configuration are not subjected to front-to-back consistency comparison, and other data except the fields are subjected to front-to-back consistency comparison.
And after the second and idempotent test centers confirm that the rule is finished, immediately issuing the rule to idempotent test agents of all servers to be applied, and processing the rule by the idempotent test agents.
Thirdly, the follow-up process does not need to be manually participated, the idempotent test Agent monitors all flow passing through the idempotent point according to the idempotent rule description, and the idempotent test is initiated once the flow meets the precondition.
The execution process mainly comprises three steps:
1. and monitoring all flow in the daily environment in real time, and if the flow inlet is defined as an idempotent point and an idempotent test is required, recording data influenced during the execution of an idempotent point method by using flow recording, wherein the data is baseline data.
2. And immediately using the same data after the execution of the idempotent method is finished, calling the idempotent method once, executing the project processing once again, and simultaneously recording the data influenced during the execution period of the flow again, wherein the data is test data.
3. Test data were compared to baseline data and idempotent was assessed according to the following principles: the test data is consistent with the corresponding baseline data content, and the database insertion operation of the test data must fail, and other operations may succeed, i.e., recording the stream twice, with data inserted only once in the database.
In addition, the test data can be newly added, and after the idempotent test is finished or within a fixed time, the idempotent test agents count the test data and transmit the results back to the idempotent test center, and after the idempotent test center receives the returned results of the agents, the idempotent test center notifies the test engineers of checking the idempotent test results according to different types. The following data were mainly viewed: failure details: a detailed view is made of which flows do not satisfy idempotent, why they do not satisfy; test details: and checking test flow statistical data of the rule on each server, wherein the test flow statistical data comprises total quantity, detail quantity, custom flow characteristic quantity and the like.
Referring to fig. 7, fig. 7 shows a verification method provided in an embodiment of the present specification, and the method is applied to a test center, and specifically includes the following steps.
Step 702: and under the condition that a rule configuration request of a first user is received, a rule configuration interface is displayed for the first user.
Step 704: and generating a test rule based on the editing operation of the first user on the rule configuration interface, and sending the test rule to a corresponding application server.
In specific implementation, the verification method applied to the test center may refer to specific description of the test center in the verification method described in the foregoing embodiments, which is not repeated herein.
The verification method applied to the test center provided by the embodiment of the specification can be used for performing idempotent rule configuration in the test center, so that the subsequent application server can directly realize idempotent test based on the idempotent rule, user participation is not needed, and the idempotent test effect is good.
Referring to fig. 8, fig. 8 shows a verification method provided in an embodiment of the present specification, where the method is applied to an application server, and specifically includes the following steps.
Step 802: and receiving an object processing request of a second user, and under the condition that the object processing request meets the test rule, performing first processing on the object processing request and acquiring first processing information.
Step 804: and after the first processing of the object processing request is completed, performing second processing on the object processing request, and acquiring second processing information.
Step 806: and performing idempotent verification on the object processing request based on the first processing information and the second processing information, and sending an idempotent verification result to a test center.
The test rule is generated based on the editing operation of the first user on a rule configuration interface and sent by the test center.
In specific implementation, the verification method applied to the application server may be referred to the specific description of the application server in the verification method in the above embodiment, which is not repeated herein.
Referring to fig. 9, fig. 9 is a schematic diagram illustrating a specific process of an authentication method applied to an application server according to an embodiment of the present disclosure.
The natural traffic in fig. 9 may be understood as a first execution of an object handling request determined by the application server to be subjected to an idempotent test, and the test traffic may be understood as a second execution of the object handling request determined by the application server to be subjected to the idempotent test.
In practical applications, the application server monitors the traffic (i.e. the object processing request), and when receiving the traffic and determining that the received traffic entry is an idempotent point set in the test rule, performs a first idempotent point call, that is, starts to execute the object processing request, and records all data conforming to the test rule during the execution of the traffic, that is, the persistent data recorded during the first project processing, for example, RESULT, DB, RPC, MSG in fig. 9, by using the traffic record. When the execution is finished, the call of the idempotent point is finished, at the moment, the application server can initiate a call again for the flow, namely, the idempotent point initiates a repeated call, the call starts, the object processing request is continuously executed, the flow recording is used for recording all data conforming to the test rule during the flow execution, and when the execution is finished, the idempotent point initiates the repeated call to finish, namely, the recorded persistent data is processed repeatedly for the second time. And finally, comparing the persistence data of the first call with the persistence data of the second call, and carrying out accurate idempotent assessment on the flow by the persistence data of the two calls of the user.
The verification method applied to the application server provided by the embodiment of the specification can be directly based on the test rule sent by the test center, the idempotent test is carried out by monitoring the flow, the idempotent test request is not required to be actively initiated, the adopted idempotent principle is not only used for carrying out the regression test of the old project, but also used for carrying out the idempotent test on the new project, and when the idempotent verification is carried out specifically, the whole data comparison is adopted, so that the condition of verification omission does not occur.
Corresponding to the above method embodiments, the present disclosure further provides an embodiment of a verification system, and fig. 10 shows a schematic structural diagram of a verification system provided in one embodiment of the present disclosure. As shown in fig. 10, the system includes:
A test center 1002, and an application server 1004, wherein,
The test center 1002 is configured to present a rule configuration interface to a first user upon receiving a rule configuration request from the first user, and
Generating a test rule based on the editing operation of the first user on the rule configuration interface, and sending the test rule to a corresponding application server 1004;
The application server 1004 is configured to receive an object processing request of a second user, perform a first processing on the object processing request if it is determined that the object processing request satisfies the test rule, and acquire first processing information, and
After the first processing of the object processing request is completed, performing a second processing on the object processing request, acquiring second processing information, performing idempotent verification on the object processing request based on the first processing information and the second processing information, and sending an idempotent verification result to the test center 1002.
Optionally, the test center 1002 is further configured to:
And sending the test rule to an application server corresponding to the application attribute information based on the application attribute information edited by the first user in the rule configuration interface in the test rule.
Optionally, the application server 1004 is further configured to:
Determining a flow entry and attribute information corresponding to the object processing request, and determining that the object processing request meets the test rule when the flow entry corresponding to the object processing request is consistent with the flow entry edited by the first user in the rule configuration interface in the test rule and the attribute information corresponding to the object processing request is consistent with the attribute information edited by the first user in the rule configuration interface in the test rule.
Optionally, the application server 1004 is further configured to:
comparing the first processing information with the second processing information, and determining an idempotent verification result of the object processing request based on the comparison result of the first processing information and the second processing information.
Optionally, the application server 1004 is further configured to:
and sending the idempotent verification result of the object processing request to the test center according to a preset time interval.
Optionally, the test center 1002 is further configured to analyze the received idempotent verification result of the object processing request, and if it is determined that the idempotent verification result of the object processing request fails, send a result viewing notification to a third user corresponding to the object processing request.
Optionally, the test center 1002 is further configured to receive a view request of the fourth user for the idempotent verification result of the object processing request, and based on the view request, present the idempotent verification result interface of the object processing request to the fourth user.
Optionally, the test center 1002 is further configured to, when receiving the result checking request of the fourth user, count idempotent verification results of all object processing requests in a time interval based on the time interval carried in the result checking request, and display the idempotent verification results to the fourth user in a graphic form.
The verification system provided in the embodiment of the present disclosure only needs to receive a scheme that a test engineer designates a need for performing an idempotent test in a test center, configure related test rules, and send the configured test rules to an application server, and then the subsequent application server automatically monitors all object processing requests that need to perform the idempotent test based on the test rules in a daily environment, performs an idempotent evaluation on the object processing requests that need to perform the idempotent test, returns a failure result of the idempotent evaluation to the test center, and sends the failure result to a corresponding test engineer by the test center for performing subsequent idempotent test update.
The above is a schematic scheme of a verification system of the present embodiment. It should be noted that, the technical solution of the verification system and the technical solution of the verification method belong to the same concept, and details of the technical solution of the verification system, which are not described in detail, can be referred to the description of the technical solution of the verification method.
Corresponding to the above method embodiments, the present disclosure further provides an embodiment of a verification apparatus, and fig. 11 shows a schematic structural diagram of a first verification apparatus provided in one embodiment of the present disclosure. The apparatus is applied to a test center, as shown in fig. 11, and includes:
An interface presentation module 1102 configured to present a rule configuration interface for a first user upon receiving a rule configuration request from the first user;
The rule sending module 1104 is configured to generate a test rule based on the editing operation of the first user on the rule configuration interface, and send the test rule to a corresponding application server.
According to the verification device provided by the embodiment of the specification, the idempotent rule configuration can be carried out in the test center, so that the subsequent application server can directly realize the idempotent test based on the idempotent rule, the user is not required to participate, and the idempotent test effect is good.
The above is a schematic version of the first authentication device of the present embodiment. It should be noted that, the technical solution of the verification device and the technical solution of the verification method belong to the same concept, and details of the technical solution of the verification device, which are not described in detail, can be referred to the description of the technical solution of the verification method.
Corresponding to the above method embodiments, the present disclosure further provides an embodiment of a verification apparatus, and fig. 12 shows a schematic structural diagram of a verification apparatus provided in one embodiment of the present disclosure. The apparatus is applied to an application server, as shown in fig. 12, and includes:
a first processing module 1202 configured to receive an object processing request of a second user, perform a first processing on the object processing request and acquire first processing information if it is determined that the object processing request meets a test rule;
a second processing module 1204, configured to perform a second processing on the object processing request after the first processing of the object processing request is completed, and obtain second processing information;
An idempotent verification module 1206 configured to perform idempotent verification on the object processing request based on the first processing information and the second processing information, and send an idempotent verification result to a test center;
the test rule is generated based on the editing operation of the first user on a rule configuration interface and sent by the test center.
The test rules applied to the verification device provided by the embodiment of the specification can be directly based on the test rules sent by the test center, the idempotent test is performed by monitoring the flow, the idempotent test request does not need to be actively initiated, the adopted idempotent principle can be used for carrying out the regression test of the old project and the idempotent test of the new project, and when the idempotent verification is specifically carried out, the whole data is adopted for comparison, so that the condition of verification omission does not occur.
The above is a schematic scheme of an authentication apparatus of the present embodiment. It should be noted that, the technical solution of the verification device and the technical solution of the verification method belong to the same concept, and details of the technical solution of the verification device, which are not described in detail, can be referred to the description of the technical solution of the verification method.
Fig. 13 illustrates a block diagram of a computing device 1300 provided in accordance with an embodiment of the present specification. The components of computing device 1300 include, but are not limited to, a memory 1310 and a processor 1320. Processor 1320 is coupled to memory 1310 via bus 1330, and database 1350 is used to store data.
Computing device 1300 also includes an access device 1340, which access device 1340 enables computing device 1300 to communicate via one or more networks 1360. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. Access device 1340 may include one or more of any type of network interface, wired or wireless (e.g., a Network Interface Card (NIC)), such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 1300, as well as other components not shown in FIG. 13, may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device illustrated in FIG. 13 is for exemplary purposes only and is not intended to limit the scope of the present description. Those skilled in the art may add or replace other components as desired.
Computing device 1300 may be any type of stationary or mobile computing device including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smart phone), wearable computing device (e.g., smart watch, smart glasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 1300 may also be a mobile or stationary server.
Wherein the processor 1320 is configured to execute computer-executable instructions that, when executed by the processor, perform the steps of any of the verification methods described above.
The foregoing is a schematic illustration of a computing device of this embodiment. It should be noted that, the technical solution of the computing device and the technical solution of the verification method belong to the same concept, and details of the technical solution of the computing device, which are not described in detail, can be referred to the description of the technical solution of the verification method.
An embodiment of the present disclosure also provides a computer-readable storage medium storing computer instructions that, when executed by a processor, implement the steps of any one of the verification methods described above.
The above is an exemplary version of a computer-readable storage medium of the present embodiment. It should be noted that, the technical solution of the storage medium and the technical solution of the verification method described above belong to the same concept, and details of the technical solution of the storage medium which are not described in detail can be referred to the description of the technical solution of the verification method described above.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The computer instructions include computer program code that may be in source code form, object code form, executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-only Memory (ROM), a random access Memory (RAM, randomAccess Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
It should be noted that, for simplicity of description, the foregoing method embodiments are all expressed as a series of combinations of actions, but it should be understood by those skilled in the art that the embodiments are not limited by the order of actions described, as some steps may be performed in other order or simultaneously according to the embodiments of the present disclosure. Further, those skilled in the art will appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily all required for the embodiments described in the specification.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
The preferred embodiments of the present specification disclosed above are merely used to help clarify the present specification. Alternative embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the teaching of the embodiments. The embodiments were chosen and described in order to best explain the principles of the embodiments and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. This specification is to be limited only by the claims and the full scope and equivalents thereof.

Claims (15)

1. A method of authentication, comprising:
The test center displays a rule configuration interface for a first user under the condition of receiving a rule configuration request of the first user, and
Generating a test rule based on the editing operation of the first user on the rule configuration interface, and sending the test rule to a corresponding application server;
The application server receives an object processing request of a second user, performs a first processing on the object processing request and acquires first processing information if the object processing request is determined to satisfy the test rule, and
And after the first processing of the object processing request is finished, performing second processing on the object processing request, acquiring second processing information, performing idempotent verification on the object processing request based on the first processing information and the second processing information, and sending an idempotent verification result to the test center.
2. The verification method according to claim 1, the sending the test rule to a corresponding application server, comprising:
And sending the test rule to an application server corresponding to the application attribute information based on the application attribute information edited by the first user in the rule configuration interface in the test rule.
3. The verification method of claim 1, the determining that the object handling request satisfies the test rule comprising:
determining a flow entry and attribute information corresponding to the object processing request;
and determining that the object processing request meets the test rule under the condition that the flow inlet corresponding to the object processing request is consistent with the flow inlet edited by the first user in the rule configuration interface in the test rule and the attribute information corresponding to the object processing request is consistent with the attribute information edited by the first user in the rule configuration interface in the test rule.
4. The authentication method of claim 1, the and performing idempotent authentication of the object processing request based on the first processing information and the second processing information, comprising:
comparing the first processing information with the second processing information, and determining an idempotent verification result of the object processing request based on the comparison result of the first processing information and the second processing information.
5. The method of verification of claim 4, the transmitting an idempotent verification result to the test center, comprising:
and sending the idempotent verification result of the object processing request to the test center according to a preset time interval.
6. The authentication method of claim 5, the method further comprising:
And the test center analyzes the received idempotent verification result of the object processing request, and sends a result checking notification to a third user corresponding to the object processing request when determining that the idempotent verification result of the object processing request fails.
7. The method of verification according to claim 1, further comprising, after the sending of the idempotent verification result to the test center:
And the test center receives a viewing request of a fourth user for an idempotent verification result of the object processing request, and displays an idempotent verification result interface of the object processing request to the fourth user based on the viewing request.
8. The method of verifying of claim 7, further comprising, after sending the idempotent verification result to the test center:
And under the condition that the test center receives the result checking request of the fourth user, counting idempotent verification results of all object processing requests in a time interval based on the time interval carried in the result checking request, and displaying the idempotent verification results to the fourth user in a picture and text mode.
9. A verification system, comprising: a test center and an application server, wherein,
The test center is configured to present a rule configuration interface for a first user upon receiving a rule configuration request of the first user, and
Generating a test rule based on the editing operation of the first user on the rule configuration interface, and sending the test rule to a corresponding application server;
The application server is configured to receive an object processing request of a second user, perform a first processing on the object processing request and acquire first processing information if it is determined that the object processing request satisfies the test rule, and
And after the first processing of the object processing request is finished, performing second processing on the object processing request, acquiring second processing information, performing idempotent verification on the object processing request based on the first processing information and the second processing information, and sending an idempotent verification result to the test center.
10. A verification method applied to a test center, comprising:
Under the condition that a rule configuration request of a first user is received, a rule configuration interface is displayed for the first user;
and generating a test rule based on the editing operation of the first user on the rule configuration interface, and sending the test rule to a corresponding application server.
11. An authentication method applied to an application server, comprising:
receiving an object processing request of a second user, and under the condition that the object processing request meets a test rule, performing first processing on the object processing request and acquiring first processing information;
after the first processing of the object processing request is completed, performing second processing on the object processing request, and acquiring second processing information;
Performing idempotent verification on the object processing request based on the first processing information and the second processing information, and sending an idempotent verification result to a test center;
The test rule is generated based on the editing operation of the first user on the rule configuration interface and sent by the test center.
12. A verification device for use in a test center, comprising:
the interface display module is configured to display a rule configuration interface for a first user under the condition that a rule configuration request of the first user is received;
and the rule sending module is configured to generate a test rule based on the editing operation of the first user on the rule configuration interface and send the test rule to a corresponding application server.
13. An authentication device, applied to an application server, comprising:
The first processing module is configured to receive an object processing request of a second user, and perform first processing on the object processing request and acquire first processing information under the condition that the object processing request meets a test rule;
The second processing module is configured to perform second processing on the object processing request after the first processing of the object processing request is completed, and acquire second processing information;
An idempotent verification module configured to perform idempotent verification on the object processing request based on the first processing information and the second processing information, and send an idempotent verification result to a test center;
The test rule is generated based on the editing operation of the first user on the rule configuration interface and sent by the test center.
14. A computing device, comprising:
A memory and a processor;
the memory is configured to store computer executable instructions, and the processor is configured to execute the computer executable instructions, which when executed by the processor, implement the steps of the authentication method of any one of claims 1-8, 10, 11.
15. A computer readable storage medium storing computer executable instructions which when executed by a processor perform the steps of the authentication method of any one of claims 1-8, 10, 11.
CN202410551456.0A 2021-04-06 2021-04-06 Verification method and device Pending CN118394642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410551456.0A CN118394642A (en) 2021-04-06 2021-04-06 Verification method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202410551456.0A CN118394642A (en) 2021-04-06 2021-04-06 Verification method and device
CN202110368386.1A CN112905492B (en) 2021-04-06 2021-04-06 Verification method and device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202110368386.1A Division CN112905492B (en) 2021-04-06 2021-04-06 Verification method and device

Publications (1)

Publication Number Publication Date
CN118394642A true CN118394642A (en) 2024-07-26

Family

ID=76110018

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202110368386.1A Active CN112905492B (en) 2021-04-06 2021-04-06 Verification method and device
CN202410551456.0A Pending CN118394642A (en) 2021-04-06 2021-04-06 Verification method and device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202110368386.1A Active CN112905492B (en) 2021-04-06 2021-04-06 Verification method and device

Country Status (1)

Country Link
CN (2) CN112905492B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113468388B (en) * 2021-06-30 2024-05-03 深圳集智数字科技有限公司 Control method, device, server and storage medium
CN113986943B (en) * 2021-12-28 2022-04-22 畅捷通信息技术股份有限公司 Data consistency verification method, device and medium based on scene data stamp

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080181123A1 (en) * 2007-01-31 2008-07-31 Alexander Lisheng Huang Methods and apparatus to manage network testing procedures
US9317410B2 (en) * 2013-03-15 2016-04-19 International Business Machines Corporation Testing functional correctness and idempotence of software automation scripts
JP6093663B2 (en) * 2013-07-04 2017-03-08 エヌ・ティ・ティ・コムウェア株式会社 Verification program, verification apparatus, and verification method
CN107229455B (en) * 2016-03-24 2019-09-17 阿里巴巴集团控股有限公司 A kind of method for processing business, apparatus and system
CN108874654B (en) * 2017-05-15 2022-08-16 创新先进技术有限公司 Idempotent validity test method, device and equipment and readable medium
US11140032B2 (en) * 2018-05-04 2021-10-05 Oracle International Corporation System and method for building idempotent configuration management modules for a cloud Infrastructure Service
CN112256480A (en) * 2020-10-22 2021-01-22 全知科技(杭州)有限责任公司 Method for controlling correct service of data repeat request

Also Published As

Publication number Publication date
CN112905492B (en) 2024-05-24
CN112905492A (en) 2021-06-04

Similar Documents

Publication Publication Date Title
USRE49486E1 (en) System and method for tracking web interactions with real time analytics
US10678683B2 (en) System and method for automated service layer testing and regression
US11233708B1 (en) System, apparatus and method for deploying infrastructure to the cloud
CN109344170B (en) Stream data processing method, system, electronic device and readable storage medium
US20130054792A1 (en) Cloud-based performance testing of functionality of an application prior to completion of development
CN109460841B (en) User account opening method, system and storage medium
CN112488652B (en) Work order auditing method, system, terminal and storage medium
CN112905492B (en) Verification method and device
US10713070B2 (en) Systems and methods for capturing and visualizing user interactions across devices
CN110659870A (en) Business audit test method, device, equipment and storage medium
US10877869B1 (en) Method and system for implementing a code review tool
CN117194253B (en) Method and system for generating test data of service scene
US11216318B2 (en) Systems, methods, and devices for implementing a central computing platform for distributed computing environments
De Vito et al. Approximate cosmic size: the quick/early method
US20130090960A1 (en) Web browser-based business activity monitoring
CN114238155B (en) Test method, test platform, test device, server and storage medium
US20220138669A1 (en) Communication system for managing distribution of products and a method thereof
CN118093345A (en) Performance capacity assessment method, device, apparatus, storage medium, and program product
CN118394655A (en) Information processing method, apparatus, device, medium, and program product
CN116955161A (en) Multi-terminal service testing method and device, storage medium and computer equipment
CN116700718A (en) Page configuration-based data processing method and system
CN118410785A (en) Project processing method, apparatus, device, medium, and program product
CN118057303A (en) Code auditing method, device, equipment and medium
CN116627830A (en) Financial business testing method and device, storage medium and electronic equipment
CN114066407A (en) Service processing method, processing device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination