Intrusive unit testing for Web applications - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Document Associé À Des Manifestations Scientifiques Année : 2009

Intrusive unit testing for Web applications

Philippe Poulard
  • Fonction : Auteur
  • PersonId : 842799

Résumé

Several tools have been designed for automating tests on Web applications. They usually drive browsers the same way people do: they click links, fill in forms, press buttons, and they check results, such as whether an expected text appears on the page. WUnit is such a tool, but goes a step further: it can act inside the server, examine server-side components, and even modify them, which gives more controls to the tests to write. For example, in our tests we can get the user session server-side, store an arbitrary object (that does have sense in our test) in the user session, and get the page that renders it. Cheating like this allows to bypass the normal functioning of a Web application and really perform independent unit tests, which gives more flexibility to test-driven development. In this session, we'll present the Active Tags framework from which is derived WUnit, and experiment how to design simply a test suite for an AJAX-based application: how to get a page, fill a form, upload files, and of course how to act on server-sides components.

Mots clés

Domaines

Web
Fichier principal
Vignette du fichier
wunit.pdf (285.84 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

inria-00481893 , version 1 (07-05-2010)

Identifiants

  • HAL Id : inria-00481893 , version 1

Citer

Philippe Poulard. Intrusive unit testing for Web applications. WWW 2009: 18th international World Wide Web conference, Apr 2009, Madrid, Spain. ⟨inria-00481893⟩
113 Consultations
77 Téléchargements

Partager

Gmail Facebook X LinkedIn More