1:LoadRunner代码如下:
//需要在代码的最前面加上下面这一函数 8888端口为fiddler的默认监听端口 127.0.0.1为fiddler所在机器的ip地址
web_set_proxy("127.0.0.1:8888");
Action()
{
web_set_proxy("127.0.0.1:8888");
web_url("picinfo.ini",
"URL=http://se.360.cn/cloud/picinfo.ini",
"TargetFrame=",
"Resource=1",
"RecContentType=application/octet-stream",
"Referer=",
"Snapshot=t1.inf",
LAST);
web_add_cookie("MUID=3B882A344D5C68BB06CB2651495C6958; DOMAIN=www.bing.com");
//关联 关联session
web_reg_save_param("sessionID",
"LB=value=",
"RB=>",
LAST);
web_url("WebTours",
"URL=http://127.0.0.1:1080/WebTours/",
"TargetFrame=",
"Resource=0",
"RecContentType=text/html",
"Referer=",
"Snapshot=t2.inf",
"Mode=HTML",
EXTRARES,
"Url=http://www.bing.com/favicon.ico", "Referer=", ENDITEM,
LAST);
//检查点 检查登陆后页面是否有 Welcome,admin这段文本文字出现 并统计该文本在下一个action出现次数
web_reg_find("Text=Welcome, <b>admin", "SaveCount=textCount",LAST);
lr_think_time(12);
web_submit_data("login.pl",
"Action=http://127.0.0.1:1080/WebTours/login.pl",
"Method=POST",
"TargetFrame=body",
"RecContentType=text/html",
"Referer=http://127.0.0.1:1080/WebTours/nav.pl?in=home",
"Snapshot=t3.inf",
"Mode=HTML",
ITEMDATA,
"Name=userSession", "Value={sessionID}", ENDITEM, //使用上一次关联的动态session
"Name=username", "Value=admin", ENDITEM,
"Name=password", "Value=123456", ENDITEM,
"Name=JSFormSubmit", "Value=off", ENDITEM,
"Name=login.x", "Value=60", ENDITEM,
"Name=login.y", "Value=10", ENDITEM,
LAST);
//图片型检查点,需要卸载被检查函数后面
web_image_check("web_image_check","src=/WebTours/images/signoff.gif",LAST);
return 0;
}
2:Fiddler设置如下
fiddler的Filters需要添加如下设置 "Show only if URL contains"表示URL中包含某字段的URL
3:运行脚本
运行脚本后我们发现fiddler有拦截到所有的URL中包含WebTours的URL,下列这个是登陆成功的案例。
4:LoadRunner结合Fiddler结语
1:Fiddler与LoadRunner的结合可以更好地分析HTTP请求与响应 分析结果