zoukankan      html  css  js  c++  java
  • Jersey(1.19.1)

    The Jersey client API was originally developed to aid the testing of the Jersey server-side, primarily to make it easier to write functional tests in conjunction with the JUnit framework for execution and reporting. It is used extensively and there are currently over 1000 tests.

    Embedded servers, Grizzly and a special in-memory server, are utilized to deploy the test-based services. Many of the Jersey samples contain tests that utilize the client API to server both for testing and examples of how to use the API. The samples utilize Grizzly or embedded Glassfish to deploy the services.

    The following code snippets are presented from the single unit test HelloWorldWebAppTest of the helloworld-webapp sample. The setUp method, called before a test is executed, creates an instance of the Glassfish server, deploys the application, and a WebResource instance that references the base resource:

    @Override
    protected void setUp() throws Exception {
        super.setUp();
    
        // Start Glassfish
        glassfish = new GlassFish(BASE_URI.getPort());
    
        // Deploy Glassfish referencing the web.xml
        ScatteredWar war = new ScatteredWar(
            BASE_URI.getRawPath(), 
            new File("src/main/webapp"),
            new File("src/main/webapp/WEB-INF/web.xml"),
            Collections.singleton(new File("target/classes").toURI().toURL()));
        glassfish.deploy(war);
    
        Client c = Client.create();
        r = c.resource(BASE_URI);
    }

    The tearDown method, called after a test is executed, stops the Glassfish server.

    @Override
    protected void tearDown() throws Exception {
        super.tearDown();
        glassfish.stop();
    }

    The testHelloWorld method tests that the response to a GET request to the Web resource returns “Hello World”:

    public void testHelloWorld() throws Exception {
        String responseMsg = r.path("helloworld").get(String.class);
        assertEquals("Hello World", responseMsg);
    }

    Note the use of the path method on the WebResource to build from the base WebResource.

  • 相关阅读:
    实测好用的awvs批量添加任务脚本
    SQL注入漏洞
    CTF-WEB-信息泄露题目总结
    Awvs+nessus docker版本
    禅道12.4.2后台管理员权限Getshell复现
    子域名工具,使用必应搜索引擎
    i春秋第二届春秋欢乐赛-Web-Hello World
    百度杯CTF比赛 九月场-WEB-题目名称:SQL
    文件上传漏洞
    CVE-2019-17625漏洞复现(Rambox 0.6.9版本存储型XSS)
  • 原文地址:https://www.cnblogs.com/huey/p/5401850.html
Copyright © 2011-2022 走看看