In this chapter, we have had a look at the various things that Selenium cannot do. We have also explored the ways in which we can extend Selenium to work with other tools that can provide us with a more complete testing toolbox.
By the time you have reached the end of this chapter, you should have some good strategies to check for dead links on web pages you are testing. You should also have sensible solutions for downloading and validating files. We also learned how to integrate Selenium with various proxies. This then gave us the ability to use our Selenium tests as a base for performance tests in JMeter; as well as a way to build attack profiles for penetration tests using the OWASP Zed Attack Proxy.
In the next chapter, we are going to look at how we can use Docker with Selenium. We will see how easy it is to start spinning up your own grid in Docker. We will...