Intrusive unit testing for Web applications

Abstract : Several tools have been designed for automating tests on Web applications. They usually drive browsers the same way people do: they click links, fill in forms, press buttons, and they check results, such as whether an expected text appears on the page. WUnit is such a tool, but goes a step further: it can act inside the server, examine server-side components, and even modify them, which gives more controls to the tests to write. For example, in our tests we can get the user session server-side, store an arbitrary object (that does have sense in our test) in the user session, and get the page that renders it. Cheating like this allows to bypass the normal functioning of a Web application and really perform independent unit tests, which gives more flexibility to test-driven development. In this session, we'll present the Active Tags framework from which is derived WUnit, and experiment how to design simply a test suite for an AJAX-based application: how to get a page, fill a form, upload files, and of course how to act on server-sides components.
Type de document :
Documents associés à des manifestations scientifiques -- Hal-inria+
WWW 2009: 18th international World Wide Web conference, Apr 2009, Madrid, Spain
Domaine :
Liste complète des métadonnées

https://hal.inria.fr/inria-00481893
Contributeur : Philippe Poulard <>
Soumis le : vendredi 7 mai 2010 - 15:13:23
Dernière modification le : mercredi 29 juillet 2015 - 01:19:55
Document(s) archivé(s) le : vendredi 19 octobre 2012 - 14:36:10

Fichier

wunit.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

  • HAL Id : inria-00481893, version 1

Collections

Citation

Philippe Poulard. Intrusive unit testing for Web applications. WWW 2009: 18th international World Wide Web conference, Apr 2009, Madrid, Spain. 〈inria-00481893〉

Partager

Métriques

Consultations de
la notice

162

Téléchargements du document

97