Book Image

Mastering SoapUI

Book Image

Mastering SoapUI

Overview of this book

SoapUI is an open-source cross-platform testing application that provides complete test coverage and supports all the standard protocols and technologies. This book includes real-time examples of implementing SoapUI to achieve quality and business assurance. Starting with the features and functionalities of SoapUI, the book will then focus on functional testing, load testing, and security testing of web services. Furthermore, you will learn how to automate your services and then design data-driven, keyword-driven, and hybrid-driven frameworks in SoapUI. Then the book will show you how to test UIs and services using SoapUI with the help of Selenium. You will also learn how to integrate SoapUI with Jenkins for CI and SoapUI test with QC with backward- and forward-compatibility. The final part of the book will show you how to virtualize a service response in SoapUI using Service Mocking. You will finish the journey by discovering the best practices for SoapUI test automation and preparing yourself for the online certification of SoapUI.
Table of Contents (18 chapters)
Mastering SoapUI
Credits
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Preface
7
SoapUI Integration with Jenkins and HP QC
Index

Configuring boundary scan types


Let's see how we configure a boundary scan in SoapUI:

  1. The following screenshot displays the configuration parameters for configuring a Boundary Scan:

  2. In the preceding screenshot, click on the + button in the top right of the left hand side of the window. This will further open a pop-up dialog box for further configuration.

  3. In the preceding screenshot we can see that we have configured three values:

    • Parameter Name: Target parameter Request

    • Parameter label: Relevant name of the parameter of the request

    • XPath: XPath of the parameter

  4. After configuring this, click on the Add button and this will add the attack.

  5. Similarly, we configure another parameter; Password.

  6. Now we have configured a Boundary Scan for authentication service:

  7. Similarly we configure a SQL injection test:

    Note

    Note: We can also configure and add SQL injection strings using the Advanced tab, as shown in the preceding screenshot.

  8. The steps to configure the third scan, which is XPath injection, are the same...