-
Notifications
You must be signed in to change notification settings - Fork 33
WAAT using HttpSniffer
This is a generic approach to Web Analytics Test Automation. Regardless of the end-product doing Web Analytics reporting and analysis (example: Omniture, Google Analytics, etc.), you can use this approach to test, in an automated way, if correct name/value properties are being reported by the product / system under test.
This approach captures TCP packets on the network layer, from all the network devices available. Based on the criteria specified in your tests, only those relevant packets are filtered out, and used for analysis and verifications.
Because of the limitation listed in the FAQs about doing Web Analytic validation in a pure https environment, the HttpSniffer approach will not work in such a (pure-https) environment. An alternative is to use WAAT's JsSniffer plugin approach.
In order to enable packet capturing, the WAAT framework needs helps of some 3-rd party open-source libraries. These libraries are available for various different operating systems in the download section of the WAAT project. Refer to the Jpcap Setup section for platform specific install instructions.
Provide the test data to be validated for each action in an xml file. Sample XML file is provided here.
You will need to make the changes shown HttpSniffer test changes in your existing / new tests.