Cloud architecture for automated testing
First Claim
1. A system comprising:
- a set of processors;
a storage device comprising instructions, which when executed by the set of processors, cause the system to perform operations to;
receive a virtual machine, a virtual machine image, or a virtual hard disk by a cloud service, the cloud service operating on a processing platform, with the virtual machine, the virtual machine image, or the virtual hard disk having a test payload provided via a connection with an external site over a physical network;
create a set of clones of the virtual machine, the virtual machine image, or the virtual hard disk and inject tools into each clone;
create a reproduction of the received virtual machine, the received virtual machine image, or the received virtual hard disk;
test one or more clones of the set in an environment isolated from the physical network and isolated from a backend of the cloud service such that the test of the one or more clones includes use of the injected tools and is conducted within the isolated environment that is secured without interaction from the physical network and without interaction with the backend during the test once testing has begun, the backend including systems, other than the isolated environment, on the processing platform for the cloud service, the environment isolated from the backend by a security virtual machine that controls data flow from the isolated environment to the backend such that the backend is protected from untrusted features of the clones under test;
in response to a determination of a defect in a tested clone, provide the defect to the reproduction via the security virtual machine;
run the reproduction, in the isolated environment, with respect to the defect and provide results of running the reproduction to the security virtual machine; and
report results of the testing.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatus and methods can be implemented to perform software testing or to perform emulated hardware testing using a cloud architecture that can utilize centralized testing technology and can enable scaling up to test for multiple tenants and scaling up to arbitrary numbers of programs tested for each tenant. A user can configure an initial test virtual machine on a cloud platform for a cloud service over a physical network such as the Internet. Components of the cloud architecture can create a set of clones of the initial test virtual machine and inject tools into each clone for testing. Testing of one or more clones of the set can be conducted in an environment isolated from the physical network and isolated from a backend of the cloud service. Additional apparatus, systems, and methods are disclosed.
-
Citations
24 Claims
-
1. A system comprising:
-
a set of processors; a storage device comprising instructions, which when executed by the set of processors, cause the system to perform operations to; receive a virtual machine, a virtual machine image, or a virtual hard disk by a cloud service, the cloud service operating on a processing platform, with the virtual machine, the virtual machine image, or the virtual hard disk having a test payload provided via a connection with an external site over a physical network; create a set of clones of the virtual machine, the virtual machine image, or the virtual hard disk and inject tools into each clone; create a reproduction of the received virtual machine, the received virtual machine image, or the received virtual hard disk; test one or more clones of the set in an environment isolated from the physical network and isolated from a backend of the cloud service such that the test of the one or more clones includes use of the injected tools and is conducted within the isolated environment that is secured without interaction from the physical network and without interaction with the backend during the test once testing has begun, the backend including systems, other than the isolated environment, on the processing platform for the cloud service, the environment isolated from the backend by a security virtual machine that controls data flow from the isolated environment to the backend such that the backend is protected from untrusted features of the clones under test; in response to a determination of a defect in a tested clone, provide the defect to the reproduction via the security virtual machine; run the reproduction, in the isolated environment, with respect to the defect and provide results of running the reproduction to the security virtual machine; and report results of the testing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving a virtual machine, a virtual machine image, or a virtual hard disk by a cloud service, the cloud service operating on a processing platform, with the virtual machine, the virtual machine image, or the virtual hard disk having a test payload provided via a connection with an external site over a physical network; creating a set of clones of the virtual machine, the virtual machine image, or the virtual hard disk and inject tools into each clone; creating a reproduction of the received virtual machine, the received virtual machine image, or the received virtual hard disk; testing one or more clones of the set in an environment isolated from the physical network and isolated from a backend of the cloud service such that the testing of the one or more clones includes using the injected tools and conducting within the isolated environment that is secured without interaction from the physical network and without interaction with the backend during the test once testing has begun, the backend including systems, other than the isolated environment, on the processing platform for the cloud service, the environment isolated from the backend by a security virtual machine that controls data flow from the isolated environment to the backend such that the backend is protected from untrusted features of the clones under test; providing, in response to a determination of a defect in a tested clone, the defect to the reproduction via the security virtual machine; running the reproduction, in the isolated environment, with respect to the defect and providing results of running the reproduction to the security virtual machine; and reporting results of the testing. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory machine-readable medium comprising instructions, which when executed by a set of processors, cause a system to perform operations comprising:
-
receiving a virtual machine, a virtual machine image, or a virtual hard disk by a cloud service, the cloud service operating on a processing platform, with the virtual machine, the virtual machine image, or the virtual hard disk having a test payload provided via a connection with an external site over a physical network; creating a set of clones of the virtual machine, the virtual machine image, or the virtual hard disk and inject tools into each clone; creating a reproduction of the received virtual machine, the received virtual machine image, or the received virtual hard disk; testing one or more clones of the set in an environment isolated from the physical network and isolated from a backend of the cloud service such that the testing of the one or more clones includes using the injected tools and conducting within the isolated environment that is secured without interaction from the physical network and without interaction with the backend during the test once testing has begun, the backend including systems, other than the isolated environment, on the processing platform for the cloud service, the environment isolated from the backend by a security virtual machine that controls data flow from the isolated environment to the backend such that the backend is protected from untrusted features of the clones under test; providing, in response to a determination of a defect in a tested clone, the defect to the reproduction via the security virtual machine; running the reproduction, in the isolated environment, with respect to the defect and providing results of running the reproduction to the security virtual machine; and reporting results of the testing. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification