Verification method, device, equipment and storage medium of reconstruction system

文档序号:7458 发布日期:2021-09-17 浏览:41次 中文

1. A method of validating a reconstruction system, the method being adapted for use with a post-reconstruction system, the method comprising:

receiving a service request sent by a verification system;

generating a second calling request according to the service request;

according to the second calling request, baffle data fed back by the verification system is obtained, the baffle data is response data of the system before reconstruction sent to the system before reconstruction, and the first calling request is obtained by the system before reconstruction according to the service request;

processing the service request according to the baffle data to obtain second output data;

feeding back the second output data to the verification system so that the verification system verifies whether the reconstructed system has defects according to the second output data and the first output data, wherein the first output data is response data of the system before reconstruction to the service request.

2. The method of claim 1, wherein prior to generating the second invocation request, the method further comprises:

judging whether the reconstructed system needs to call a server system or not according to the service request;

if the server side system needs to be called, the second calling request is obtained;

and if the server side system does not need to be called, processing the service request to obtain the second output data.

3. The method of claim 1, wherein before receiving the service request sent by the validation system, the method further comprises:

and sending a synchronization instruction to the verification system so that the verification system performs synchronous operation on the reconstructed system according to the environmental data and the service data of the system before reconstruction.

4. The method of claim 1, further comprising:

and feeding back the second calling request to the verification system so that the verification system verifies whether the reconstructed system has defects according to the second calling request and the first calling request and/or the second output data and the first output data.

5. An authentication apparatus of a reconstruction system, comprising:

the first receiving module is used for receiving the service request sent by the verification system;

the first generation module is used for generating a second calling request according to the service request;

a second obtaining module, configured to obtain, according to the second call request, baffle data fed back by a verification system, where the baffle data is response data to the first call request sent by the server system to the system before reconstruction, and the first call request is obtained by the system before reconstruction according to the service request;

the first processing module is used for processing the service request according to the baffle data to obtain second output data;

and the first feedback module is used for feeding back the second output data to the verification system so that the verification system verifies whether the reconstructed system has defects according to the second output data and the first output data, wherein the first output data is response data of the system before reconstruction to the service request.

6. A method of validating a reconstruction system, the method being adapted for use with a pre-reconstruction system, the method comprising:

receiving a service request sent by a requester system;

generating a first calling request according to the service request and sending the first calling request to a server system;

obtaining baffle data corresponding to the first calling request fed back by the server side system;

processing the service request according to the baffle data to obtain first output data;

and storing the service request, the baffle data and the first output data and sending the data to a verification system so that the verification system initiates verification on the reconstructed system.

7. The method of claim 6, further comprising:

and sending a first calling request to the verification system so that the verification system initiates verification on the reconstructed system according to the first calling request and/or the first output data.

8. The method of claim 6, further comprising:

and sending the environmental data and the service data to the verification system so that the verification system performs synchronous operation on the system after reconstruction and the system before reconstruction.

9. An authentication apparatus of a reconstruction system, comprising:

the second receiving module is used for receiving the service request sent by the requester system;

the second generation module is used for generating a first calling request according to the service request and sending the first calling request to the server system;

the third obtaining module is used for obtaining baffle data which are fed back by the server side system and correspond to the first calling request;

the second processing module is used for processing the service request according to the baffle data to obtain first output data;

and the first sending module is used for storing the service request, the baffle data and the first output data and sending the service request, the baffle data and the first output data to a verification system so that the verification system initiates verification on the reconstructed system.

10. A method of validating a reconstruction system, the method being adapted for use in a validation system, the method comprising:

sending a service request to the reconstructed system;

receiving a second calling request for the server system sent by the reconstructed system;

according to the second calling request, baffle data are matched and sent to the system after reconstruction, the baffle data are response data of the system before reconstruction sent to the system before reconstruction, and the first calling request is obtained by the system before reconstruction according to the service request;

receiving second output data fed back by the system after reconstruction, wherein the second output data is obtained by processing the service request by the system after reconstruction according to baffle data;

and verifying whether the reconstructed system has defects according to the second output data and the pre-stored first output data.

11. The method of claim 10, wherein after verifying whether the reconstructed system has a defect according to the second output data and the pre-stored first output data, the method further comprises:

and if the system after reconstruction has defects, repairing the system after reconstruction.

12. The method according to claim 10, wherein the verifying whether the system has a defect after the reconstruction is performed according to the second output data and the pre-stored first output data further comprises:

and comparing the first output data with the second output data according to a preset comparison rule, and verifying whether the reconstructed system has defects, wherein the preset comparison rule comprises one or a combination of difference filtering, difference mapping, difference shielding and difference defects.

13. The method of claim 10, wherein the service request comprises:

a function verification request and a performance verification request;

the function verification request comprises a full verification request and a local verification request;

the total verification request is used for verifying all transaction services in a preset time period according to a time sequence; the local verification request is used for verifying the transaction service by using a preset dimension.

14. The method of claim 13, wherein the preset dimensions comprise: one or a combination of several of a trading channel, a trading object, a trading mechanism, a trading category and a custom dimension.

15. The method of claim 10, further comprising:

receiving a second call request fed back by the reconstructed system;

and verifying whether the reconstructed system has defects or not according to the second calling request and a pre-stored first calling request and/or the second output data and the first output data.

16. An authentication apparatus of a reconstruction system, comprising:

the second sending module is used for sending the service request to the reconstructed system;

the third receiving module is used for receiving a second calling request sent by the reconstructed system;

the matching module is used for matching baffle data according to the second calling request and sending the baffle data to the reconstructed system, the baffle data is response data of a system before reconstruction, which is sent by a server side system, to a first calling request, and the first calling request is obtained by the system before reconstruction according to the service request;

the fourth receiving module is used for receiving second output data fed back by the reconstructed system, and the second output data is obtained by processing the service request by the reconstructed system according to the baffle data;

and the verification module is used for verifying whether the reconstructed system has defects or not according to the second output data and the pre-stored first output data.

17. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any one of claims 1 to 4 or 6 to 8 or 10 to 15 when executing the computer program.

18. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any of claims 1 to 4 or claims 6 to 8 or claims 10 to 15.

Background

With the continuous growth of the internet market and the rapid expansion of services, the problem that the original system is not adapted to the existing requirements may occur, however, in consideration of many factors such as development cost and development period, sometimes a new system is not directly developed to replace the original system, but the original system is reconstructed. The reconfiguration can be carried out without changing the external functions of the system, and only the internal structure is readjusted. And after reconstruction, the integrity and the robustness of the new system need to be verified. However, in the prior art, the verification of the reconstructed system mainly adopts a manual full-flow test mode, that is, a manual production request message is put into verification to determine whether the input and output of the system before reconstruction and the system after reconstruction are consistent. However, the verification process often has many technical problems of high verification cost, high error rate of artificially checking data, excessive dependence on a peripheral system and the like. In view of the above, the present disclosure is directed to provide a method for verifying a reconfiguration system, so as to achieve convenient, low-cost, and accurate verification of the reconfiguration system and overcome the problem of dependence on peripheral systems.

Disclosure of Invention

In view of the foregoing problems in the prior art, it is an object of the present disclosure to provide a method, an apparatus, a device, and a storage medium for verifying a reconfiguration system, so as to solve the problems of high verification cost, low reliability, and dependence on a peripheral system in the prior art.

In order to solve the technical problems, the specific technical scheme is as follows:

in one aspect, provided herein is a method of validating a reconstruction system, comprising:

receiving a service request sent by a verification system;

generating a second calling request according to the service request;

according to the second calling request, baffle data fed back by the verification system is obtained, the baffle data is response data of the system before reconstruction sent to the system before reconstruction, and the first calling request is obtained by the system before reconstruction according to the service request;

processing the service request according to the baffle data to obtain second output data;

feeding back the second output data to the verification system so that the verification system verifies whether the reconstructed system has defects according to the second output data and the first output data, wherein the first output data is response data of the system before reconstruction to the service request.

In another aspect, this document also provides an authentication apparatus of a reconstruction system, including:

the first receiving module is used for receiving the service request sent by the verification system;

the first generation module is used for generating a second calling request according to the service request;

a second obtaining module, configured to obtain, according to the second call request, baffle data fed back by a verification system, where the baffle data is response data to the first call request sent by the server system to the system before reconstruction, and the first call request is obtained by the system before reconstruction according to the service request;

the first processing module is used for processing the service request according to the baffle data to obtain second output data;

and the first feedback module is used for feeding back the second output data to the verification system so that the verification system verifies whether the reconstructed system has defects according to the second output data and the first output data, wherein the first output data is response data of the system before reconstruction to the service request.

In another aspect, a method for validating a reconstruction system is also provided, including:

receiving a service request sent by a requester system;

generating a first calling request according to the service request and sending the first calling request to a server system;

obtaining baffle data corresponding to the first calling request fed back by the server side system;

processing the service request according to the baffle data to obtain first output data;

and storing the service request, the baffle data and the first output data and sending the data to a verification system so that the verification system initiates verification on the reconstructed system.

In another aspect, this document also provides an authentication apparatus of a reconstruction system, including:

the second receiving module is used for receiving the service request sent by the requester system;

the second generation module is used for generating a first calling request according to the service request and sending the first calling request to the server system;

the third obtaining module is used for obtaining baffle data which are fed back by the server side system and correspond to the first calling request;

the second processing module is used for processing the service request according to the baffle data to obtain the first output data;

and the first sending module is used for storing the service request, the baffle data and the first output data and sending the service request, the baffle data and the first output data to a verification system so that the verification system initiates verification on the reconstructed system.

In another aspect, a method for validating a reconstruction system is also provided, including:

sending a service request to the reconstructed system;

receiving a second calling request for the server system sent by the reconstructed system;

according to the second calling request, baffle data are matched and sent to the system after reconstruction, the baffle data are response data of the system before reconstruction sent to the system before reconstruction, and the first calling request is obtained by the system before reconstruction according to the service request;

receiving second output data fed back by the system after reconstruction, wherein the second output data is obtained by processing the service request by the system after reconstruction according to baffle data;

and verifying whether the reconstructed system has defects according to the second output data and the pre-stored first output data.

In another aspect, this document also provides an authentication apparatus of a reconstruction system, including:

the second sending module is used for sending the service request to the reconstructed system;

the third receiving module is used for receiving a second calling request for the server system, which is sent by the reconstructed system;

the matching module is used for matching baffle data according to the second calling request and sending the baffle data to the reconstructed system, the baffle data is response data of a system before reconstruction, which is sent by a server side system, to a first calling request, and the first calling request is obtained by the system before reconstruction according to the service request;

the fourth receiving module is used for receiving second output data fed back by the reconstructed system, and the second output data is obtained by processing the service request by the reconstructed system according to the baffle data;

and the verification module is used for verifying whether the reconstructed system has defects or not according to the second output data and the pre-stored first output data.

In another aspect, a computer storage arrangement is provided, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method steps according to the above technical solution when executing the computer program.

In another aspect, a storage medium is provided, which stores a computer program, which when executed by a processor implements the method steps according to the above technical solution.

By adopting the technical scheme, the reconstruction system, the reconstruction device, the computer equipment and the storage medium can construct an island environment for the reconstructed system, and the reconstructed system is verified by using the system service request before reconstruction, the first call request, the baffle data and the first output data, so that the verification of the reconstructed system does not need to depend on a peripheral system; the interference of human factors can be reduced, the sample property and the coverage rate of data used for verifying the reconstructed system can be improved, and the efficiency and the reliability of a verification result are improved.

In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.

Drawings

In order to more clearly illustrate the embodiments or technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.

Fig. 1 illustrates a first flowchart of a reconstruction system verification method provided in an embodiment of the present disclosure;

FIG. 2 shows a schematic diagram of an intersystem call architecture;

FIG. 3 shows a schematic diagram of the system input and output;

FIG. 4 is a first schematic structural diagram of a reconstruction system verification apparatus provided in an embodiment of the present disclosure;

FIG. 5 is a second flow chart illustrating a reconstruction system verification method provided in an embodiment of the present disclosure;

FIG. 6 is a second schematic diagram of a reconstruction system verification apparatus according to an embodiment of the disclosure;

fig. 7 is a third flow chart illustrating a verification method of a reconstruction system according to an embodiment of the present disclosure;

FIG. 8 is a third schematic diagram illustrating a reconstruction system verification apparatus according to an embodiment of the disclosure;

FIG. 9 is a schematic diagram of a reconstruction system verification system;

FIG. 10 is a schematic flow chart diagram illustrating an overall method of validating a reconstitution system;

fig. 11 shows a schematic structural diagram of a computer device provided in an embodiment herein.

Description of the symbols of the drawings:

41. a first receiving module;

42. a first generation module;

43. a second acquisition module;

44. a first processing module;

45. a first feedback module;

61. a second receiving module;

62. a second generation module;

63. a third obtaining module;

64. a second processing module;

65. a first sending module;

81. a second sending module;

82. a third receiving module;

83. a matching module;

84. a fourth receiving module;

85. a verification module;

91. a first data acquisition module;

92. a synchronization module;

93. a second data acquisition module;

94. a transaction service playback module;

95. a baffle service module;

96. comparison verification module

1102. A computer device;

1104. a processor;

1106. a memory;

1108. a drive mechanism;

1110. an input/output module;

1112. an input device;

1114. an output device;

1116. a presentation device;

1118. a graphical user interface;

1120. a network interface;

1122. a communication link;

1124. a communication bus.

Detailed Description

The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments herein without making any creative effort, shall fall within the scope of protection.

It should be noted that the terms "first," "second," and the like in the description and claims herein and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments herein described are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, apparatus, article, or device that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or device.

Reconfiguration (reconfiguring) is to improve the quality and performance of software by adjusting program codes, so that the design mode and architecture of the program become more reasonable, and the expansibility and maintainability of the software are improved.

With the rapid development of the internet, the business of the client changes continuously, some demands may be relatively stable after the system is developed, some demands may change more severely, and other demands may have disappeared or changed into other demands. In this case, the system would then need to be changed accordingly. However, considering the factors of cost, time and the like, not all systems are directly abandoned and re-developed, but the original system is reconstructed, that is, the original external functions of the system are not changed, and only the internal structure of the system is rearranged. Through reconstruction, the structure of the system is continuously adjusted, so that the reconstructed system has strong adaptability and supporting capability to business requirements all the time. The reconstruction can reduce the coupling degree of the system, so that the system is more modularized, and the development efficiency and the later maintenance of the system are improved.

Of course, it is important to verify the reconstructed system in order to make the reconstructed system have functional integrity and robustness. The verification method adopted in the prior art mainly adopts a manual full-flow test, namely, according to the involved transaction path and transaction flow, through manual clicking, sending and other operation triggers, test data are enabled to run once for joint test on a reconstructed system and an associated peripheral system (in a framework of interactive calling of a plurality of systems, when a user stands at a certain system, all other systems associated with the system, including a service requester system and a service provider system, which are collectively called as peripheral systems), and then manual comparative analysis is carried out according to a test result, so that the verification purpose is achieved. This consequently results in: the coordination of peripheral systems is excessively depended on, particularly a complex scene needing linkage of a plurality of peripheral systems is involved, and when the peripheral systems are unstable or not supported in place, the coordination cost is high, and the test progress is slow; in addition, most of the test data come from manual creation, system pre-embedding, system intervention and the like, so that the test data is single, the sample performance is reduced, the coverage case is incomplete, and the verification structure of the reconstructed system is not reliable enough; the comparison of the verification output results mainly depends on manual comparison and verification, the labor cost is high, the error rate is high, and the test efficiency is low.

In order to solve the above problems, embodiments herein provide a method for verifying a reconfiguration system, which can conveniently and accurately verify a reconfigured system, reduce cost, and overcome a problem of dependence on a peripheral system. Fig. 1 is a first flow chart of a method for validating a reconstitution system provided in embodiments herein, where the present specification provides the method operations as described in the embodiments or in the flow charts, but may include more or less operations based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual system or apparatus product executes, it can execute sequentially or in parallel according to the method shown in the embodiment or the figures. As shown in fig. 1, the method is applicable to a post-reconstruction system, and includes:

s110: receiving a service request sent by a verification system;

s120: generating a second calling request according to the service request;

it should be noted that, as shown in fig. 2, the schematic diagram of the inter-system call architecture is shown, and for a system, the system may be used as a server system for other systems to call the system, or may be used as a requester system to initiate a call request to other systems. The same is true for the system before/after reconfiguration in the embodiment of the present specification, and when a service request received by the system needs to be completed by the function implementation of another system, a second call request may be sent to the server system. The system before/after reconstruction can send a call request to a same server system more than once, and can also send a call request to a plurality of different server systems, that is, for a service request, the system before/after reconstruction may need a plurality of functional coordination of the plurality of server systems.

As can be seen from fig. 2, for the pre/post reconfiguration system in the embodiment of the present specification, there are two ways for data input, namely, an input request sent by the service requester system and an input response returned by the service provider system; the data output also has two ways, namely the output response returned by the reconstructed system to the service requester system and the output call request sent to the service provider system, namely the system input and output schematic diagram shown in fig. 3.

As can be seen from fig. 2 and 3, on the premise that the associated system and the existing functions are not affected, it is only necessary to ensure that the same data input is performed on the system after reconstruction and the system before reconstruction, and then the output data generated by the two systems are compared and verified according to the preset comparison rule.

S130: obtaining baffle data fed back by a verification system according to the second calling request, wherein the baffle data is used for summarizing response data of the server system to the first calling request sent to the system before reconstruction, the baffle data is used for completely simulating the return of the server system, and the first calling request is obtained by analyzing the service request by the system before reconstruction; in an embodiment of the present specification, the post-reconstruction system is obtained by reconstructing the pre-reconstruction system;

s140: processing the service request according to the baffle data to obtain second output data;

namely, the verification system uses the service request processed by the system before reconstruction to realize playback in the system after reconstruction. In the embodiment of the present specification, playback (also referred to as replay) refers to an operation of letting the verification system automatically simulate that a requester system initiates a service request to a system after reconstruction and simulate that a server system returns response data (i.e. barrier data) according to an original function flow and a transaction path before reconstruction.

S150: feeding back the second output data to the verification system so that the verification system verifies whether the reconstructed system has defects according to the second output data and the first output data, wherein the first output data is response data of the system before reconstruction to the service request.

The verification method for the reconstruction system provided by the embodiment of the specification can verify the function and performance of the reconstructed system by using the service request data, the first output data and the baffle data of the system before reconstruction, thereby overcoming the dependence on a peripheral system, reducing the influence of human factors and being beneficial to improving the verification accuracy.

Before generating the second invocation request, the method further includes:

judging whether the reconstructed system needs to call a server system or not according to the service request; because the system after reconfiguration may have some improvements over the system before reconfiguration, there may be a situation where the service request may be processed without initiating a call to the server system.

If the server side system needs to be called, generating the second calling request; so that the validation system can match the baffle data according to the second call request;

and if the server side system does not need to be called, directly processing the service request to obtain the second output data.

Preferably, in the embodiment of the present specification, step S110: before receiving the service request sent by the verification system, the method further includes:

s100: and sending a synchronization instruction to the verification system so that the verification system can acquire the environmental data and the service data of the system before reconstruction, and further carrying out synchronous operation on the system after reconstruction so that the system after reconstruction is synchronous with the system before reconstruction.

The system after reconstruction and the system before reconstruction are in the same level, and the consistency of the environmental data and the service data of the system after reconstruction and the system before reconstruction is ensured, which is a precondition for subsequent verification. The synchronization of the system after reconstruction and the system before reconstruction can be realized by the following method:

carrying out daily batching processing on the system before reconstruction in T-1 day to collect static data of the T-1 day according to a set rule, wherein the collected data comprises environment data such as system date, directory structure and the like, and business data such as business date, customer information, accounting information, product information and the like; the environmental data and the business data may be production environment data of the system before reconstruction, for example. Certainly, in some feasible embodiments, the test environment data of the system before reconstruction may also be acquired to play a role in enriching data sources and improving verification efficiency of the reconstruction system, and it needs to be explained that the production environment data is more real and accurate.

Processing (for example, formatting treatment is carried out on the static data acquired in the last step so that the static data in the system before reconstruction has a format suitable for the system after reconstruction) according to the design difference between the system before reconstruction and the system after reconstruction, and initialization data for synchronizing the system after reconstruction is obtained;

and initializing the system after reconstruction by using the initialization data, so that the system data of the system after reconstruction and the system before reconstruction in the T-1 day are at the same level (for example, environmental data such as system time, business date, customer information and the like, and the system after reconstruction of business data is synchronous with the system before reconstruction at a certain point).

In some possible embodiments, the method further comprises:

and feeding back the second calling request to the verification system so that the verification system verifies whether the reconstructed system has defects according to the second calling request and the first calling request, and/or the second output data and the first output data. For the server system, if the second call request of the system after reconstruction is inconsistent with the first call request of the system before reconstruction, the server system needs to be improved appropriately to adapt to the system after reconstruction, which increases the burden of development and upgrade of the server system. The reconstruction system verification method provided by the embodiment of the specification can also verify the reconstructed system through the difference between the calling requests of the server system by the systems before and after reconstruction, so that the verification method is more diversified and is favorable for improving the verification accuracy.

In summary, the verification method for the reconstruction system provided in the embodiments of the present specification can construct an island environment for the reconstructed system, and eliminate the dependence on the peripheral system during verification; initializing a reconstructed system in an island environment by using static data acquired from the system before reconstruction, and preparing data leveling and baffle service; and performing playback verification on the reconstructed system by using the service data, the first output data, the baffle data, the first call request and other operation state data of the system before reconstruction to obtain a verification result.

As shown in fig. 4, a first structural schematic diagram of an authentication device of a reconstruction system provided in an embodiment of the present specification, the device includes:

a first receiving module 41, configured to receive a service request sent by a verification system;

a first generating module 42, configured to generate a second invocation request according to the service request;

a second obtaining module 43, configured to obtain, according to the second call request, baffle data fed back by a verification system, where the baffle data is response data sent by the server system to the system before reconstruction and is obtained by analyzing the service request by the system before reconstruction;

the first processing module 44 is configured to process the service request according to the baffle data to obtain second output data;

a first feedback module 45, configured to feed back the second output data to the verification system, so that the verification system verifies whether the reconstructed system has a defect according to the second output data and first output data, where the first output data is response data of the system before reconstruction to the service request.

The beneficial effects obtained by the verification device of the reconstruction system provided by the embodiment of the present specification are consistent with the beneficial effects obtained by the above method, and are not described herein again.

As shown in fig. 5, an embodiment of the present specification further provides a verification method for a reconstruction system, where the method is applied to a system before reconstruction, and the method includes:

s510: receiving a service request sent by a requester system;

s520: generating a first calling request according to the service request and sending the first calling request to a server system;

s530: obtaining baffle data corresponding to the first calling request fed back by the server side system; the baffle data is essentially response data which is sent by the server system to the system before reconstruction and corresponds to the first calling request, and the response data is stored as the baffle data for feeding back to the system after reconstruction to meet the calling requirement of the server system. S540: processing the service request according to the baffle data to obtain the first output data;

s550: and storing the service request, the baffle data and the first output data and sending the data to a verification system so that the verification system initiates verification on the reconstructed system.

Further comprising:

and sending a first calling request to the verification system so that the verification system initiates verification on the reconstructed system according to the first calling request and/or the first output data.

The method further comprises the following steps:

and sending the environmental data and the service data to the verification system so that the verification system performs synchronous operation on the system after reconstruction and the system before reconstruction.

The verification method provided by the embodiment of the present specification is applicable to a system before reconstruction, and the system before reconstruction sends a service request sent by a requester system, a first call request to a server system, baffle data fed back by the server system, and first output data fed back by the requester system to a verification system as running state data, so that the verification system verifies the reconstructed system according to the running state data. Therefore, the system after reconstruction does not need to depend on a peripheral system and does not need to interact with the system before reconstruction; and the reconstruction operation of the system before reconstruction is not influenced.

As shown in fig. 6, an embodiment of the present specification further provides an authentication apparatus for a reconstruction system, including:

a second receiving module 61, configured to receive a service request sent by a requester system;

a second generating module 62, configured to generate a first invocation request according to the service request and send the first invocation request to the server system;

a third obtaining module 63, configured to obtain baffle data corresponding to the first invocation request, where the baffle data is substantially response data of the server system to the first invocation request, and the baffle data is fed back by the server system;

a second processing module 64, configured to process the service request according to the baffle data to obtain the first output data;

a first sending module 65, which stores the service request, the baffle data and the first output data and sends them to a verification system, so that the verification system initiates verification on the reconstructed system.

The advantages achieved by the device provided by the embodiment of the specification are consistent with those achieved by the method, and are not described in detail herein.

As shown in fig. 7, an embodiment of the present specification further provides a verification method for a reconfiguration system, where the method is applied to a verification system, and the method includes:

s710: sending a service request to the reconstructed system;

s720: receiving a second calling request for the server system sent by the reconstructed system;

s730: according to the second calling request, baffle data are matched and sent to the system after reconstruction, the baffle data are response data of the system before reconstruction sent to the system before reconstruction, and the first calling request is obtained by the system before reconstruction according to the service request;

s740: receiving second output data fed back by the system after reconstruction, wherein the second output data is obtained by processing the service request by the system after reconstruction according to baffle data;

s750: and verifying whether the reconstructed system has defects according to the second output data and the pre-stored first output data.

Further, step S710: before sending the service request to the post-reconfiguration system, the method further includes:

s700: and receiving a service request fed back by the system before reconstruction, the baffle data and the first output data.

Namely, the service request sent to the system after reconstruction, the baffle data used for responding to the second calling request of the system after reconstruction and the first output data used for comparing and verifying with the second output data of the system after reconstruction are all running state data from the system before reconstruction. The operation state data of the system before reconstruction is used for verifying the system after reconstruction, verification data do not need to be created manually, and related peripheral systems do not need to be pre-buried, interfered and the like, so that the verification cost can be reduced, and the verification efficiency is improved; and the running state data used for verification can be more comprehensive, the problems of low sample nature and poor coverage are avoided, and the reliability of the system verification structure after reconstruction can be improved.

Further, step S750: after verifying whether the reconstructed system has a defect according to the second output data and the pre-stored first output data, the method further comprises:

s760: and if the reconstructed system is verified to have defects, repairing the reconstructed system.

It should be noted that after the system after reconstruction is repaired, it can be determined whether data synchronization is required for the system after reconstruction and the system before reconstruction according to actual conditions, and then verification is performed (the verification system can perform repeated playback on the collected static and dynamic data in the system after reconstruction so as to verify whether the defect is repaired or reproduced, and in this process, data rollback of each peripheral system is not required, which is beneficial to improving defect verification efficiency and accuracy) until the system after reconstruction does not have the defect.

In some possible embodiments, step S730: according to the second call request, baffle data are matched and sent to the reconstructed system, and the following method can be specifically adopted:

analyzing the second calling request to obtain a transaction serial number;

and matching the baffle data according to the transaction serial number. The transaction serial number corresponds to the transaction service one by one, and the transaction serial number is the unique identifier of the transaction service on a transaction path. When a service requester sends a service request to a system before reconstruction, a transaction serial number of the service request is carried; the system carries the transaction serial number when feeding back the first output data before reconstruction.

When the system needs to call the server system before reconstruction, a first call request is generated and sent to the server system, and the essence is that the system before reconstruction initiates a service request to the server system, so that the first call request comprises a transaction serial number corresponding to the first call request, and when the server system feeds back the baffle data to the system before reconstruction, the transaction serial number is fed back together with the baffle data.

It should be noted that the service request (or the first invocation request) includes fields as shown in table 1:

TABLE 1

Accordingly, the first output data (or baffle data) may include fields as shown in table 2:

TABLE 2

In some preferred embodiments, in addition to matching based on transaction serial number baffle data, one or more combinations of transaction serial number, response system number, transaction code, sequence number, and response status may be used.

In some possible embodiments, the method further comprises:

receiving a second call request fed back by the reconstructed system;

and verifying whether the reconstructed system has defects or not according to the second calling request and a pre-stored first calling request and/or the second output data and the first output data.

Preferably, the post-reconstruction system is verified from the perspective of the transaction line, the data line, and the accounting line, respectively: and carrying out data decoding and analysis on the transaction message, the interactive file and the database, and carrying out comparative analysis on multiple dimensions such as data format, structure, field, name, value range, change process and the like.

In some preferred embodiments, step S750: verifying whether the reconstructed system has defects according to the second output data and the pre-stored first output data, and further comprising:

and comparing the first output data with the second output data according to a preset comparison rule, and verifying whether the reconstructed system has defects, wherein the preset comparison rule comprises one or a combination of difference filtering, difference mapping, difference shielding and difference defects.

The differential filtering means: and filtering each generated difference, and identifying and grouping each difference according to a set rule so that the difference grouping and the difference number in the grouping are clear. In practice, there are generally the following grouping dimensions: platform level difference (such as system framework problem and the like), module level difference (such as functional module of the system and the like), environment level difference (such as system authority, software such as middleware, machine hardware stability factor and the like), demand non-synchronization difference (when newly added demands are simultaneously developed by the system after reconstruction and the system before reconstruction, the system after reconstruction is behind the system before reconstruction), explanatory difference, difference to be analyzed, other difference and the like, and different difference groups can be formulated according to the service characteristics and the architecture form of the system to be reconstructed for difference filtering.

The disparity mapping refers to: and (3) embedding the mapping rules for the preset difference formulation before the comparative analysis is operated, and performing self-mapping when the differences generated by the comparative analysis are operated and hit the mapping rules, so that the hit differences are degraded. Mapping rules generally include field name mapping (e.g., a post-reconstruction system and a pre-reconstruction system differ in field naming rules, including case sensitivity, hump marking, etc.), for example: the system before reconstruction is represented by Name for the user Name, and the system after reconstruction is represented by Name, data dictionary mapping (e.g. the system before reconstruction is represented by "false-no true-yes", and the system after reconstruction is represented by "0-no 1-yes" for "no" relation, etc.), date format mapping (e.g. the system before reconstruction is represented by "yyyyy/MM/dd", and the system after reconstruction is represented by "yyyyyy-MM-dd", etc.), file code system mapping (e.g. the system before reconstruction is represented by GB18030, and the system after reconstruction is represented by UTF-8), etc.

The differential shielding means that: and (4) establishing a shielding rule according to the difference result analyzed in the previous round, and shielding the newly generated difference. The method has the advantages that in practical application, the difference of a certain link of a main process and a key process is shielded when the whole process cannot be continuously executed downwards due to the difference, so that the subsequent steps depended on in the process can be circulated downwards. In addition, the verification speed of the reconstructed system can be accelerated after the difference in the rules is shielded.

The difference defect is that: generating defect information corresponding to the difference according to the established rule, wherein the defect information comprises: defect time, defect version, defect severity (low, medium, high), belonging module, assignment processing team, defect source (transaction line, data line, accounting line, etc.), priority, status, topic scenario, etc. to enable the difference generated by the contrastive analysis to seamlessly interface with the commonly used defect management tool (such as Mercury Quality Center) for subsequent defect resolution, circulation, tracking.

It should be noted that, in this embodiment of the present specification, the service request includes:

a function verification request and a performance verification request;

the performance verification request is to point to a reconstructed system to be verified and concurrently send a batch of service requests to verify the concurrent processing performance of the reconstructed system, and the batch of service requests may have a certain classification rule, for example, the system is configured with a plurality of servers in a cluster, and high availability is realized through load balancing, and then performance verification may be realized according to the server number, the module to which the server belongs, and the like, which receive the service request.

The function verification request is to send service requests to the reconstructed system to be verified one by one so as to verify the function of the reconstructed system.

The function verification request comprises a full verification request and a local verification request;

the full verification request is used for verifying all transactions in a preset time period according to a time sequence; the local authentication request is to authenticate the transaction with a preset dimension.

Optionally, the preset dimensions include: the transaction system comprises one or more of transaction channels (internet bank, mobile banking, ATM machines and the like), transaction objects (collective or individual, wherein the individual can be common customers and VIP customers respectively), transaction mechanisms (local banks involved in transaction business), transaction categories (account opening, deposit and withdrawal, account transfer and the like) and custom dimensions.

Therefore, the reconstruction system verification method provided by the embodiment of the specification can verify the reconstructed system in a single service and batch service mode, reduce artificial interference, improve the sample nature of test data, verify the coverage rate of test cases, and improve the timeliness and accuracy of verification.

As shown in fig. 8, an embodiment of the present specification further provides an authentication apparatus for a reconstruction system, including:

a second sending module 81, configured to send a service request to the post-reconfiguration system;

a third receiving module 82, configured to receive a second call request to the server system sent by the reconstructed system;

the matching module 83 is configured to match baffle data according to the second call request and send the baffle data to the post-reconstruction system, where the baffle data is response data of a first call request sent by a server system to a pre-reconstruction system, and the first call request is obtained by the pre-reconstruction system according to the service request;

a fourth receiving module 84, configured to receive second output data fed back by the reconstructed system, where the second output data is obtained by processing the service request by the reconstructed system according to the baffle data;

and the verification module 85 is configured to verify whether the reconstructed system has a defect according to the second output data and the pre-stored first output data.

As shown in fig. 9, embodiments herein provide a verification system that may be used for verification of a post-reconstruction system, the system comprising:

the first data acquisition module 91 is configured to acquire static data of the system before reconstruction, where the static data includes environment data such as a system date and a directory structure, and business data such as a business date, customer information, accounting information, and product information;

a synchronization module 92, configured to perform a synchronization operation on the system after reconstruction according to the static data acquired by the first data acquisition module 91, so that the environment and the data level of the system after reconstruction are synchronized with the system before reconstruction;

the second data acquisition module 93 is configured to acquire running state data of the system before reconstruction, where the running state data includes a service request sent by a requester system to the system before reconstruction and first output data responded by the system before reconstruction to the requester system; when the system before reconstruction needs to call the server system for processing the service request, the method further comprises the steps of obtaining a first call request sent by the system before reconstruction to the server system and response data (as baffle data for playback of subsequent transactions) corresponding to the first call request and fed back by the server system;

the data acquired by the second data acquisition module 93 can not only be subjected to function verification test, but also be subjected to performance verification test; global verification, local verification, single-stroke/batch verification, abnormal scene reproduction and the like can be performed according to different verification strategies.

A transaction service playback module 94, configured to send a service request to the post-reconstruction system to initiate verification;

the baffle service module 95 is configured to obtain a second call request generated by the reconstructed system when the reconstructed system needs to call the server system in response to the service request, and match the first call request and/or the service request according to the second call request, so as to match corresponding baffle data;

the comparison and verification module 96 is used for acquiring second output data fed back by the system after reconstruction according to the service request or according to the service request and the baffle data; and verifying the reconstructed system according to the first output data and the second output data. The comparison and verification module 96 is further configured to verify the reconstructed system according to the first call request and the second call request, and/or the first output data and the second output data.

In the verification process of the system after reconstruction, the cooperation of the system before reconstruction and a peripheral system is not needed, the dependence and investment of the system verification after reconstruction are reduced, and the baffle data returned by the baffle service module are more accurate, so that the verification process is independently controllable, the manpower and coordination cost is reduced, and the verification accuracy and efficiency are improved.

As shown in fig. 10, a verification method is also provided corresponding to the reconstruction system verification system shown in fig. 9:

s101: the system processes the service request from the requester system before reconstruction;

s102: when a server system needs to be called, the system sends a first calling request corresponding to the service request to the server system before reconstruction;

s103: acquiring response data (namely baffle data used for transaction playback) fed back by the server side system and corresponding to the first calling request;

s104: processing the service request according to the response data to obtain the first output data; feeding back the first output data to the service request party; when the system before reconstruction does not need to call a server system to complete the processing of the service request in a matching way, the first output data is directly processed.

S105: storing the service request, the baffle data and the first output data and sending the service request, the baffle data and the first output data to a verification system; in some possible embodiments, the first invocation request may also be sent to the verification system;

s106: the verification system sends a service request to the reconstructed system;

s107: when the reconstructed system needs to call the server system, the verification system receives a second call request for the server system, which is sent by the reconstructed system;

s108: the verification system matches corresponding baffle data according to the second calling request and simulates a server system to simulate and feed back to the reconstructed system;

s109: the system receives the baffle data after reconstruction, processes the service request based on the baffle data to obtain second output data and sends the second output data to the verification system; when the reconstructed system does not need to call the server system to complete the processing of the service request in a matching manner, the second output data can be directly processed.

S1010: the verification system verifies whether the reconstructed system has defects according to the second output data and the first output data; in some possible embodiments, the verification system may further verify whether the reconstructed system has a defect according to the second output data and the first output data, and/or according to the first call request and the second call request.

Preferably, in step S106: before the verification system sends the service request to the post-reconstruction system, the method further comprises:

acquiring static data sent by a system before reconstruction, wherein the static data comprises environmental data and service data;

and receiving a synchronization instruction sent by the system after reconstruction so as to carry out synchronization operation corresponding to the system before reconstruction on the system after reconstruction through the static data.

Therefore, the verification method for the reconstructed system, which is suitable for the verification system and provided by the embodiment of the present specification, can verify the reconstructed system with the service request, the first call request, the baffle data, and the first output data of the system before reconstruction, so that the verification process does not need to depend on a peripheral system.

As shown in fig. 11, for a computer device provided for embodiments herein, the computer device 1102 may include one or more processors 1104, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. The computer device 1102 may also include any memory 1106 for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, memory 1106 may include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any memory may use any technology to store information. Further, any memory may provide volatile or non-volatile retention of information. Further, any memory may represent fixed or removable components of computer device 1102. In one case, when the processor 1104 executes the associated instructions, which are stored in any memory or combination of memories, the computer device 1102 can perform any of the operations of the associated instructions. The computer device 1102 also includes one or more drive mechanisms 1108, such as a hard disk drive mechanism, an optical disk drive mechanism, etc., for interacting with any memory.

Computer device 1102 may also include an input/output module 1110(I/O) for receiving various inputs (via input device 1112) and for providing various outputs (via output device 1114). One particular output mechanism may include a presentation device 1116 and an associated Graphical User Interface (GUI) 1118. In other embodiments, input/output module 1110(I/O), input device 1112, and output device 1114 may also be excluded, as only one computer device in a network. Computer device 1102 can also include one or more network interfaces 1120 for exchanging data with other devices via one or more communication links 1122. One or more communication buses 1124 couple the above-described components together.

Communication link 1122 may be implemented in any manner, e.g., via a local area network, a wide area network (e.g., the Internet), a point-to-point connection, etc., or any combination thereof. Communications link 1122 may include any combination of hardwired links, wireless links, routers, gateway functions, name servers, etc., governed by any protocol or combination of protocols.

Corresponding to the methods in fig. 1 to 3, 5, 7 or 10, the embodiments herein also provide a computer-readable storage medium having stored thereon a computer program, which when executed by a processor performs the steps of the above-described method.

Embodiments herein also provide computer readable instructions, wherein when executed by a processor, a program thereof causes the processor to perform a method as in fig. 1-3, fig. 5, fig. 7 or fig. 10.

It should be understood that, in various embodiments herein, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments herein.

It should also be understood that, in the embodiments herein, the term "and/or" is only one kind of association relation describing an associated object, meaning that three kinds of relations may exist. For example, a and/or B, may represent: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.

Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.

It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.

In the several embodiments provided herein, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.

The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purposes of the embodiments herein.

In addition, functional units in the embodiments herein may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.

The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present invention may be implemented in a form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.

The principles and embodiments of this document are explained herein using specific examples, which are presented only to aid in understanding the methods and their core concepts; meanwhile, for the general technical personnel in the field, according to the idea of this document, there may be changes in the concrete implementation and the application scope, in summary, this description should not be understood as the limitation of this document.

完整详细技术资料下载
上一篇:石墨接头机器人自动装卡簧、装栓机
下一篇:多数据类型参数化定义及程序引用处理方法和系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!