LoadRunner结合Fiddler查看http请求响应日志

1:LoadRunner代码如下:

//需要在代码的最前面加上下面这一函数 8888端口为fiddler的默认监听端口 127.0.0.1为fiddler所在机器的ip地址

web_set_proxy("127.0.0.1:8888");

Action()
{
	web_set_proxy("127.0.0.1:8888");

	web_url("picinfo.ini", 
		"URL=http://se.360.cn/cloud/picinfo.ini", 
		"TargetFrame=", 
		"Resource=1", 
		"RecContentType=application/octet-stream", 
		"Referer=", 
		"Snapshot=t1.inf", 
		LAST);

	web_add_cookie("MUID=3B882A344D5C68BB06CB2651495C6958; DOMAIN=www.bing.com");

	//关联 关联session
	web_reg_save_param("sessionID",
		"LB=value=",
		"RB=>",
		LAST);


	web_url("WebTours", 
		"URL=http://127.0.0.1:1080/WebTours/", 
		"TargetFrame=", 
		"Resource=0", 
		"RecContentType=text/html", 
		"Referer=", 
		"Snapshot=t2.inf", 
		"Mode=HTML", 
		EXTRARES, 
		"Url=http://www.bing.com/favicon.ico", "Referer=", ENDITEM, 
		LAST);

	//检查点 检查登陆后页面是否有 Welcome,admin这段文本文字出现 并统计该文本在下一个action出现次数
	web_reg_find("Text=Welcome, <b>admin", "SaveCount=textCount",LAST);

	lr_think_time(12);

	web_submit_data("login.pl", 
		"Action=http://127.0.0.1:1080/WebTours/login.pl", 
		"Method=POST", 
		"TargetFrame=body", 
		"RecContentType=text/html", 
		"Referer=http://127.0.0.1:1080/WebTours/nav.pl?in=home", 
		"Snapshot=t3.inf", 
		"Mode=HTML", 
		ITEMDATA, 
		"Name=userSession", "Value={sessionID}", ENDITEM, //使用上一次关联的动态session
		"Name=username", "Value=admin", ENDITEM, 
		"Name=password", "Value=123456", ENDITEM, 
		"Name=JSFormSubmit", "Value=off", ENDITEM, 
		"Name=login.x", "Value=60", ENDITEM, 
		"Name=login.y", "Value=10", ENDITEM, 
		LAST);

	//图片型检查点,需要卸载被检查函数后面
	web_image_check("web_image_check","src=/WebTours/images/signoff.gif",LAST);

	return 0;
}

2:Fiddler设置如下

fiddler的Filters需要添加如下设置 "Show only if URL contains"表示URL中包含某字段的URL

3:运行脚本

运行脚本后我们发现fiddler有拦截到所有的URL中包含WebTours的URL,下列这个是登陆成功的案例。

4:LoadRunner结合Fiddler结语

1:Fiddler与LoadRunner的结合可以更好地分析HTTP请求与响应 分析结果

猜你喜欢

转载自blog.csdn.net/hujyhfwfh2/article/details/82724341
今日推荐