review
Test login function (need (input analysis, processing and analysis, the analysis outputs), data structure, prepared by Example)
Test point design ideas - expansion (related businesses, special angle - branch, abnormal, reverse)
Painting a flowchart elements (start / end of the path, the data is determined, in step / process)
Business Process Testing --tpshop purchase goods flow (determined process requirements, draw a flow chart, written cases)
The functional test used in the context database (performed with the embodiment, data validation; positioning BUG; scene configuration; upgraded SQL)
Day learning objectives
-
Understanding the Non-functional testing: efficiency, security and compatibility features
-
Grasp the core content of the test report
-
Learn HTML and HTTP protocol
-
Familiar with the HTTP requests and responses
-
And get familiar with HTTP request method post
-
Packet capture tools can be used fiddler
-
Mastering fiddler filtering function
-
Method modification request data master fiddler
Non-functional testing
Non-functional testing - Compatibility
focus point:
-
Operating System: windows, linux, mac
-
Browser: IE, chrome, firefox, 360, cheetahs, European Peng Opera, Safari
-
Screen size, Resolution: 1920x1080, 1366x768
Compatibility test:
-
Testers as clear as possible compatibility requirements during the requirements phase
-
Testing is recommended: first we must use a compatible environment for testing during functional testing, and can be developed using the browser stagger
-
Note: To test both desktop and notebook test again, can not follow the habit, only test equipment at hand.
Non-functional testing - efficiency
Scene: Project function requires processing time, a large amount of users
Focus: the page is loaded, the information submitted (registration, generate orders) completion time
Improve the efficiency of the approach:
-
Use caching mechanisms
-
SQL optimization (paging query)
Non-functional testing - security
Scene: Information related to privacy, personal and property safety
focus point:
-
Sensitive information (account passwords, social security number) encryption (preservation and transmission process are encrypted)
-
SQL injection, input box special syntax, were put together with the original SQL statement, to change the original intent of SQL
-
SQL injection login function ( 'or 1 = 1 #)
select * from tp_users where mobile = '' or 1=1 # ' and password =''
-
Non-functional testing - testing interface
Test method: According to the design provided by the UI / prototype map, detailed comparison (after separate functional test)
Scene: a dedicated design aspects, there are specific design can reference
Interface testing attention: elements of the page, the style (color, font, size), position, alignment
The core content of the test report
-
After the results of the test and work
-
Risk assessment
-
Summary and analysis of defects
-
Summary and improve test work
Network Fundamentals
HTML和HTTP
html: HyperText Markup Language HTML
http: HyperText Transfer Protocol Hypertext Transfer Protocol
Hypertext: pictures, video, audio, music
http network can transmit the contents of the html
URL uniform resource locator Uniform Resource Locator
http Resources
http://127.0.0.1/index.php/Home/user/login.html
Format: HTTP: // ip address: 8080 / resource path location
Local resources
file: // E: /
other:
ftp file transfer protocol ftp: // ip address / resource path
Domain names
Domain Name Server DNS domain name system
cookie
Two sides:
-
Enhance the experience
-
Against the user's privacy (history)
Storage: stored in a local browser
cookie content: name, value, domain, period
HTTP request
The client (browser) requests to the server
Access URL http protocol
HTTP response
Processing client requests the server response
Content of the response: html web pages, images, text
Specific content of the HTTP request
Request line: URL, http protocol, request method
Request header: browser information, cookie
Request body: specific content of the request
Specific content of the HTTP response
Response line: http protocol, it returns a status code
Response header: web server information, the length of the response content, the content type of the response
Details http response: Response Body
The two common methods in the HTTP
GET request method
Parameter in the URL request http://127.0.0.1/index.php?m=Home&c=Goods&a=dispatching
GET advantages:
Easy to record, save, save as a bookmark.
Restrictions: length restrictions, content request is limited.
POST request method
Requested content in the body of the request.
POST Advantages: safe, requesting the content length is not restricted.
Status of the response:
2XX: normal response 200
3XX: Redirection 302304
4XX: client error, 404 (resource does not exist), 403 (insufficient privileges)
5XX: server error, 500
Fiddler Introduction
Proxy http requests and responses
All client requests go through fiddler, then transferred to the server
Response from the server to go through fiddler, then transferred to the client
Fiddler view details of capture
fiddler Clear caught package
Three ways:
-
Toolbar "X" button, select remove all
-
The bottom of the command line, type "cls"
-
Selection data packet, the keystrokes "Delete" key or the right selection remove
Use fiddler filtered
-
Enter filters, check the "use filters"
-
Select the second drop-down box, select "show only the following Hosts"
-
Input ip / host name input box below, a plurality of IP, a separation using a semicolon (;)
-
Top right, click the button "Actions", choose "Run Filterset now"
fiddler modify data interface requests
-
菜单中rules-->Automatic Breakpoints ->Before request
-
User interface, background Create an account
-
Modification request data, select "Run to completion"
-
Close to intercept, rules -> Automatic Breakpoints -> Disabled
fiddler usage scenarios:
-
By Ethereal, another view of software projects
-
-
Scene configuration / data
-
Reproduced in: https: //www.cnblogs.com/snailon/p/11065680.html