Locust學習筆記5——登錄接口參數關聯

  引言

  前面在Locust學習筆記3——模擬登錄案例(非加密) 講了登錄接口,但是這個登錄的接口並不需要動態參數以及加密簽名等校驗,而且也沒有繼續講登錄後的操作。現在這篇文章主要講上下接口關聯的場景,比如接口A返回的數據,作爲接口B的請求參數。

  之前講的登錄接口是Vue的接口,現在我以學信網爲例:https://account.chsi.com.cn/passport/login,講一下參數關聯的場景。

  獲取參數

  使用抓包工具Fiddler,我們登錄學信網後,可以看到這樣的請求參數信息:

 

  可以看出,每次登錄成功,請求參數中都會有lt參數和execution參數,並且每次都不一樣,

  lt 參數是每次打開瀏覽器,訪問登錄首頁時服務端會返回一個新的數據

  execution 參數是表示網站刷新次數,可以刷新下再登錄,就變成其他了

  也就是這兩個參數是動態的,那麼這兩個參數是從哪裏獲取呢?

  我們退出學信網,直接請求登錄頁面(get請求:https://account.chsi.com.cn/passport/login),查看返回的html內容:

 

   <input class="btn_login" name="submit" accesskey="l" value="登錄" tabindex="4" type="submit" title="登錄" />
                            
                            <div class="account-oprate clearfix">
                                <a class="find-yhm" href="https://account.chsi.com.cn/account/password!rtvlgname">找回用戶名</a>
                                <a class="find-mm" href="https://account.chsi.com.cn/account/password!retrive">找回密碼</a>
                                <a href="https://account.chsi.com.cn/account/preregister.action?from=account-login" class="regist-btn">註冊</a>
                            </div>
                            <input type="hidden" name="lt" value="LT-116311-d5aphA2zczml3uQsGczEx2eQVI5TGk-cas" />
                            <input type="hidden" name="execution" value="5ba3ba8a-f18c-40ec-952c-c3fa89815155_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" />

  

   獲取動參代碼:

  利用lxml爬蟲框架獲取html頁面中的屬性對應的值

import requests
from lxml import etree
import urllib3
urllib3.disable_warnings()

s = requests.session()
def get_execution_lt():
    """
    獲取登錄的動態參數
    """
    url = 'https://account.chsi.com.cn/passport/login'
    headers = {"User-Agent": "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.138 Safari/537.36"}
    s.headers.update(headers)
    r = s.get(url=url,verify=False)
    dom = etree.HTML(r.content.decode('utf-8')) # 返回的是list對象
    result = {}
    try:
        # print(dom.xpath('//*[@id="fm1"]/input[2]')[0].get('value'))
        result['lt'] = dom.xpath('//input[@name="lt"]')[0].get('value')
        result['execution'] = dom.xpath('//input[@name="execution"]')[0].get('value')
        print(result)
    except:
        print("動態參數lt、execution獲取失敗!")
    return result
if __name__ == '__main__':
    login_setup = get_execution_lt()

  運行結果:

{'lt': 'LT-124381-CEGJ5JiOi1gm1qYeOXsxPcUiYMRDTi-cas', 'execution': 'e3493856-74e4-4108-89c5-527389da290d_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'}

Process finished with exit code 0

  備註:上面可以看出,我使用了requests.session()方法,作用是創建一個session會話,當你使用這個session登錄之後,再次使用session請求系統其他頁面的時候,默認使用session會話之前使用的cookie參數。例如JSESSIONID

 

 

 

   requests.session()會自動保存,這樣就實現cookie關聯,get_execution_lt()這個函數其實已經獲取到了cookies參數。

  登錄源碼

import requests
from lxml import etree
import urllib3
urllib3.disable_warnings()
import json

s = requests.session()
def get_execution_lt():
    """
    獲取登錄的動態參數
    """
    url = 'https://account.chsi.com.cn/passport/login'
    headers = {"User-Agent": "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.138 Safari/537.36"}
    s.headers.update(headers)
    r = s.get(url=url,verify=False)
    dom = etree.HTML(r.content.decode('utf-8')) # 返回的是list對象
    result = {}
    try:
        # print(dom.xpath('//*[@id="fm1"]/input[2]')[0].get('value'))
        result['lt'] = dom.xpath('//input[@name="lt"]')[0].get('value')
        result['execution'] = dom.xpath('//input[@name="execution"]')[0].get('value')
        print(json.dumps(result,sort_keys=True,indent=10))
    except:
        print("動態參數lt、execution獲取失敗!")
    return result


# print(login_setup,111111)

def login_action():
    # 登錄
    url2 = 'https://account.chsi.com.cn/passport/login'
    body = {
        "username":'15099925895',
        "password":'a8413809',
        "lt":login_setup['lt'],
        "execution":login_setup['execution'],
        "_eventId":'submit'
    }
    h2 = {
    "Content-Type": "application/x-www-form-urlencoded"

    }
    s.headers.update(h2)
    # import json,urllib.parse
    # data_dic = eval(body)
    # data_urlencode = urllib.parse.urlencode(data_dic).encode(encoding='UTF-8')

    r2 = s.post(url=url2,data=body)
    try:
        assert '退出' in r2.text
        print("登錄成功")
    except:
        print("登錄失敗")


def get_account():
    # 登錄後請求
    r3 = s.get(url='https://account.chsi.com.cn/account/account!show')
    try:
        assert '查看個人信息_學信網' in r3.text
        print("查詢成功")
    except:
        print("查詢失敗")
if __name__ == '__main__':
    login_setup = get_execution_lt()
    login_step = login_action()
    check_account = get_account()

  

  運行結果:

 

 

  Locust參數關聯源碼

  由於公司項目的網站涉及公司保密協議,暫時用學信網來寫這個案例,具體如下代碼:

 

__author__ = 'Leo'

from locust import HttpLocust,TaskSet,task,between
from lxml import etree
import json
import urllib3
urllib3.disable_warnings()

class LoginTest(TaskSet):
    """
    定義用戶行爲類
    """
    def get_execution_lt(self):
        """
        獲取登錄的動態參數
        """
        url = '/passport/login'
        headers = {"User-Agent": "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.138 Safari/537.36"}
        self.client.headers.update(headers)
        r = self.client.get(url=url,verify=False)
        dom = etree.HTML(r.content.decode('utf-8')) # 返回的是list對象
        result = {}
        try:
            # print(dom.xpath('//*[@id="fm1"]/input[2]')[0].get('value'))
            result['lt'] = dom.xpath('//input[@name="lt"]')[0].get('value')
            result['execution'] = dom.xpath('//input[@name="execution"]')[0].get('value')
            print(json.dumps(result,sort_keys=True,indent=10))
        except:
            print("動態參數lt、execution獲取失敗!")
        return result

    def login_action(self,account,password):
        # 登錄
        login_setup = self.get_execution_lt()
        url2 = '/passport/login'
        body = {
            "username":account,
            "password":password,
            "lt":login_setup['lt'],
            "execution":login_setup['execution'],
            "_eventId":'submit'
        }
        h2 = {
        "Content-Type": "application/x-www-form-urlencoded"

        }
        self.client.headers.update(h2)
        # import json,urllib.parse
        # data_dic = eval(body)
        # data_urlencode = urllib.parse.urlencode(data_dic).encode(encoding='UTF-8')

        r2 = self.client.post(url=url2,data=body,verify=False)
        try:
            assert '退出' in r2.text
            print("登錄成功")
        except:
            print("登錄失敗")
    def on_start(self):
        account = '15099925895'
        password = 'a8413809'
        self.login_action(account,password)

    @task(1)
    def get_account(self):
        # 登錄後請求
        r3 = self.client.get(url='https://account.chsi.com.cn/account/account!show')
        try:
            assert '查看個人信息_學信網' in r3.text
            print("查詢成功")
        except:
            print("查詢失敗")

class WebSiteUser(HttpLocust):
    task_set = LoginTest
    host = "https://account.chsi.com.cn"
    wait_time = between(3,6)

if __name__ == '__main__':
    import os
    os.system('locust -f locust_xuexin.py')

  運行結果:

 

  界面:

 

 

  總結

  到此,以登錄後請求其他接口的案例已經講完,在實際項目中可以根據這個思路來壓測需要登錄後的接口。有興趣的朋友可以加入測開交流羣進行溝通與學習,一起成長! 

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章