Service handlers

The architectural approach followed by GITB TDL is to capture in the test case the high level testing flow and delegate detailed domain-specific processing to separate services. These services can cover messaging between actors, complex processing or content validation and implement APIs that are defined in the GITB specification. The components implementing these services are termed generally handlers and, depending on their purpose can be:

Another important distinction for handlers is whether they are embedded within the test bed software or external. Considering that handlers are typically used to extend the test bed for domain-specific operations, the norm is to externalise them as remotely callable services. Embedded handlers are typically defined for generic and simple use cases that are frequently encountered in test cases.

One thing that needs to be clear to test case authors is that the use of embedded handlers limits the portability of their test cases. Each embedded handler used needs to be implemented in exactly the same way in another test bed and furthermore needs to be identified using the same name.

Specifying the handler implementation

Handlers are defined in the following steps:

  • btxn: When beginning a messaging transaction.
  • bptxn: When beginning a processing transaction.
  • verify: When validating content.

The element corresponding to each of these steps defines a handler attribute to identify the handler implementation. In case an embedded handler is to be used the value specified here is the name of the handler (see Embedded handlers). Using an external handler implementation is achieved by specifying as the handler value the address where the service’s WSDL file is located. The test bed will automatically detect in this case that the handler is external and will internally replace local method invocations with web service calls.

The value provided for the handler attribute can also be provided with a pure variable reference (see Referring to variables) allowing the actual value to be determined from configuration or even dynamically based on the test session context. In such a case the variable reference is first evaluated to a string that is then considered to determine whether the handler is a remote or embedded one.

The following example shows three validation steps taking place, the first one using an embedded XSDValidator, the second one using an external validation service, and the third one using an external validation service whose address is configurable:

<!--
    Call a local, embedded validation handler called "XSDValidator"
-->
<verify handler="XSDValidator" desc="Validate content local">
    <input name="xmldocument">$docToValidate</input>
    <input name="xsddocument">$schemaFile</input>
</verify>
<!--
    Call a remote validation service handler
-->
<verify handler="https://serviceaddress?wsdl" desc="Validate content remote">
    <input name="xmldocument">$docToValidate</input>
    <input name="xsddocument">$schemaFile</input>
</verify>
<!--
    Call a remote validation service handler (address in configuration)
-->
<verify handler="$DOMAIN{validationHandlerAddress}" desc="Validate content remote">
    <input name="xmldocument">$docToValidate</input>
    <input name="xsddocument">$schemaFile</input>
</verify>

Using remote service handlers is considered a best practice based on the benefits they offer:

  • Scalability: Potentially heavy processing is handled by a dedicated service outside the test bed that can be scaled appropriately.
  • Separation of concerns: The test bed focuses on test orchestration whereas domain specific logic is captured only in the test case and the services it uses.
  • Extensibility: New capabilities can be added to the test bed by simply making available a new service to call.
  • Maintenance: Updates to service handlers can take place without impacting test bed operations or requiring new versions of the test bed software. Similarly external service updates would not require new test suite versions.
  • Better presentation: Remote service handlers can encapsulate multiple custom actions leading to better test session presentation. If e.g. a document needs to be validated by one XSD and two Schematron files we would only show a single, concise validation step versus three separate validations.

Embedded handlers

The sections that follow list the handler implementations that already exist as predefined embedded implementations in the GITB test bed software.

Embedded messaging handlers

Each following section defines a table with the information expected by each messaging handler. The meaning of this information is as follows:

  • Input: These are the inputs provided for the send step.
  • Output: These are the outputs returned from the receive step.
  • Actor configuration: These are configuration properties that will be automatically set for simulated actors using this handler.
  • Receive configuration: These are configuration properties expected by the receive step.
  • Send configuration: These are configuration properties expected by the send step.
  • Transaction configuration: These are configuration properties defined in the btxn or bptxn step.

The title of each section corresponds to the name of the handler that needs to be configured in the relevant step’s handler attribute.

TCPMessaging

Used to send or receive an arbitrary byte stream over TCP.

Element name Element type Required? Type Description
content Input Yes binary The stream of bytes to send.
content Output Yes binary The stream of bytes received.
network.host Actor configuration Yes string The host of the actor.
network.port Actor configuration Yes number The listen port for the actor.
<btxn from="Actor1" to="Actor2" txnId="t1" handler="TCPMessaging"/>
<send id="dataSend" desc="Send data" from="Actor1" to="Actor2" txnId="t1">
    <input name="content">$binaryContent</input>
</send>
<receive id="dataReceive" desc="Receive data" from="Actor2" to="Actor1" txnId="t1"/>
<etxn txnId="t1"/>

UDPMessaging

Used to send or receive arbitrary bytes over UDP.

Element name Element type Required? Type Description
content Input Yes binary The stream of bytes to send.
content Output Yes binary The stream of bytes received.
network.host Actor configuration Yes string The host of the actor.
network.port Actor configuration Yes number The listen port for the actor.
<btxn from="Actor1" to="Actor2" txnId="t1" handler="UDPMessaging"/>
<send id="dataSend" desc="Send data" from="Actor1" to="Actor2" txnId="t1">
    <input name="content">$binaryContent</input>
</send>
<receive id="dataReceive" desc="Receive data" from="Actor2" to="Actor1" txnId="t1"/>
<etxn txnId="t1"/>

SoapMessaging

Used to send or receive payloads via SOAP web service calls.

Element name Element type Required? Type Description
http_headers Input No map A map of HTTP headers to include.
soap_message Input Yes object The SOAP envelope to send.
soap_attachments Input No map A map of binary attachments.
http_headers Output No map The HTTP headers received.
soap_header Output Yes object The received SOAP header.
soap_body Output Yes object The received SOAP body.
soap_message Output Yes object The received SOAP envelope.
soap_content Output Yes object The XML content of the received SOAP body.
soap_attachments Output No map A map of received binary attachments.
soap_attachments_size Output No number The number of attachments received.
network.host Actor configuration Yes string The host of the actor.
network.port Actor configuration Yes number The listen port for the actor.
http.uri Actor configuration No string The request path to send the SOAP request to.
soap.version Receive configuration Yes string SOAP Version. Can be 1.1 or 1.2.
soap.version Send configuration Yes string SOAP Version. Can be 1.1 or 1.2.
soap.encoding Send configuration No string Character set encoding.
http.uri.extension Send configuration No string HTTP URI extension for the address.
http.ssl Transaction configuration No boolean Whether or not connections should be over HTTP (default) or HTTPS.
<btxn from="Actor1" to="Actor2" txnId="t1" handler="SoapMessaging"/>
<send id="dataSend" desc="Send data" from="Actor1" to="Actor2" txnId="t1">
    <config name="soap.version">1.2</config>
    <input name="soap_message">$soapMessage</input>
</send>
<receive id="dataReceive" desc="Receive data" from="Actor2" to="Actor1" txnId="t1">
    <config name="soap.version">1.2</config>
</receive>
<etxn txnId="t1"/>

Using HTTPS

The SoapMessaging handler can be used both over an HTTP and (one-way) HTTPS connection. The default setting is connection over HTTP. Switching to HTTPS is done at the level of the handler’s enclosing transaction and applies to all subsequent send or receive steps. Enabling HTTPS is achieved by passing a configuration parameter named “http.ssl” with a value of true or false (case insensitive) as part of the begin transaction step (step btxn). This must be provided at this point because it is needed when creating the sender and receiver implementation.

The following example illustrates its use:

<btxn from="sender" to="receiver" txnId="t1" handler="SoapMessaging">
    <config name="http.ssl">true</config>
</btxn>
<send id="dataSend" desc="Send data" from="sender" to="receiver" txnId="t1">
    <config name="soap.version">$soapVersion</config>
    <input name="soap_message">$soapMessage</input>
</send>

Note that the value “true” in this example could also have been provided as a variable reference (e.g. $isHTTPS) allowing a test case to remain unaffected if the underlying communication needs to be over HTTP or HTTPS. This could be especially interesting in cases where the SoapMessaging handler is used to test SUT endpoints over which the test bed has no control over the underlying transport channel. In this case the “http.ssl” parameter could be set as part of the system’s configuration, as in the following example (assuming an endpoint name of “sutInfo” and an endpoint parameter named “isHTTPS”):

<btxn from="sender" to="receiver" txnId="t1" handler="SoapMessaging">
    <config name="http.ssl">$sutInfo{isHTTPS}</config>
</btxn>

Note

Isolating communications: Handler HttpsMessaging builds upon the mechanism of HttpMessaging to isolate test session communications when receiving data. Check it’s documentation on what is needed to achieve this.

HttpMessaging

Used to send or receive content over HTTP.

Element name Element type Required? Type Description
http_version Input No string The HTTP version to consider.
http_headers Input No map The map of HTTP headers to send.
http_body Input No binary The HTTP request body’s bytes.
http_parts Input No map A map including the definition of the parts (see description below).
http_method Output No string The HTTP method.
http_version Output No string The HTTP version.
http_path Output No string The HTTP request path.
http_headers Output No map The map of received headers.
http_body Output No binary The bytes of the received body.
http_parts Output No map A map including the received parts (see description below).
network.host Actor configuration Yes string The host of the actor.
network.port Actor configuration Yes number The listen port for the actor.
http.uri Actor configuration No string The request path for the request.
status.code Receive configuration No string The status code for responses.
http.method Send configuration Yes string The HTTP method to use when sending.
http.uri Send configuration No string The request path URI to send to.
http.uri.extension Send configuration No string HTTP URI extension for the address.
status.code Send configuration No string Status for responses.
http.ssl Transaction configuration No boolean Whether or not connections should be over HTTP (default) or HTTPS.
<btxn from="Actor1" to="Actor2" txnId="t1" handler="HttpMessaging"/>
<send id="dataSend" desc="Send data" from="Actor1" to="Actor2" txnId="t1">
    <config name="http.method">"POST"</input>
    <config name="http.uri">"/path/to/service"</input>
    <input name="http_body">$binaryContent</input>
</send>
<receive id="dataReceive" desc="Receive data" from="Actor2" to="Actor1" txnId="t1">
    <config name="status.code">"200"</input>
</receive>
<etxn txnId="t1"/>

Note

Isolating communications: When using a HttpMessaging handler to receive communication from a SUT, the test bed dynamically starts listening on a new port for incoming traffic. This port (along with the host) are presented to the test bed user upon test initiation so that he/she can configure the SUT accordingly. To avoid unwanted communication being received on this port that is unrelated to the test session, the test bed will only listen to requests originating from the SUT’s address, ignoring others originating from other sources. To achieve this, the test bed uses the network.host parameter configured for the SUT that needs to be provided by the tester as part of the SUT’s configuration before starting a test.

The value for the network.host parameter must be set with the public IP Address of the SUT endpoint.

Using HTTPS

The HttpMessaging handler can be used both for HTTP and (one-way) HTTPS connection. The default setting is connection over HTTP. Switching to HTTPS is done at the level of the handler’s enclosing transaction and applies to all subsequent send or receive steps. Enabling HTTPS is achieved by passing a configuration parameter named “http.ssl” with a value of true or false (case insensitive) as part of the begin transaction step (step btxn). This must be provided at this point because it is needed when creating the sender and receiver implementation.

The following example illustrates its use:

<btxn from="sender" to="receiver" txnId="t1" handler="HttpMessaging">
    <config name="http.ssl">true</config>
</btxn>
<send id="dataSend" desc="Send data" from="sender" to="receiver" txnId="t1">
    <config name="http.method">POST</config>
    <input name="http_body">$content</input>
</send>

Note that the value “true” in this example could also have been provided as a variable reference (e.g. $isHTTPS) allowing a test case to remain unaffected if the underlying communication needs to be over HTTP or HTTPS. This could be especially interesting in cases where the SoapMessaging handler is used to test SUT endpoints over which the test bed has no control over the underlying transport channel. In this case the “http.ssl” parameter could be set as part of the system’s configuration, as in the following example (assuming an endpoint name of “sutInfo” and an endpoint parameter named “isHTTPS”):

<btxn from="sender" to="receiver" txnId="t1" handler="HttpMessaging">
    <config name="http.ssl">$sutInfo{isHTTPS}</config>
</btxn>

Support for sending and receiving multipart form data

When receiving, a multipart message is detected if the ContentType header contains a boundary part. The http_parts output is a map that contains:

  • http_parts{parts}: A list of all parts in sequence.
  • http_parts{parts}{0}{header}: The part’s header as a string.
  • http_parts{parts}{0}{content}: The part’s content as a binary.
  • http_parts{partsByName}: A map of parts by name (for easy lookup of named parts):
  • http_parts{partsByName}{NAME}{header}: The part’s header as a string.
  • http_parts{partsByName}{NAME}{content}: The part’s content as a binary.

When sending, if a http_body input is present this takes precedence. If not, and a http_parts input is provided, then a multipart request is created. The http_parts input is a list of maps (one map per part). To send a part as a file the file_name property needs to be passed. Specifically the information on a part is as follows:

  • http_parts{0}{name}: The name of the part.
  • http_parts{0}{content_type}: The mime type of the part (text/plain for simple text).
  • http_parts{0}{file_name}: The name of the file to set for the part if this is a file/binary p

The following TDL example illustrates how to populate and send a multipart request with three parts (two file parts and one test part):

<imports>
    <artifact type="schema" encoding="UTF-8" name="file1">testSuite1/artifacts/file1.xml</artifact>
    <artifact type="binary" encoding="UTF-8" name="file2">testSuite1/artifacts/file2.zip</artifact>
</imports>
<variables>
    <var name="parts" type="list[map]"/>
    <var name="filePartInfo1" type="map"/>
    <var name="filePartInfo2" type="map"/>
    <var name="textPartInfo1" type="map"/>
</variables>
<actors>
    ...
</actors>
<steps>
    <!--
        Define first file part.
    -->
    <assign to="$filePartInfo1{name}" type="string">"file1"</assign>
    <assign to="$filePartInfo1{content_type}" type="string">"text/xml"</assign>
    <assign to="$filePartInfo1{file_name}" type="string">"file1.xml"</assign>
    <assign to="$filePartInfo1{content}" type="binary">$file1</assign>
    <!--
        Define second file part.
    -->
    <assign to="$filePartInfo2{name}" type="string">"file2"</assign>
    <assign to="$filePartInfo2{content_type}" type="string">"application/zip"</assign>
    <assign to="$filePartInfo2{file_name}" type="string">"file2.zip"</assign>
    <assign to="$filePartInfo2{content}" type="binary">$file2</assign>
    <!--
        Define a third text part.
    -->
    <assign to="$textPartInfo1{name}" type="string">"text1"</assign>
    <assign to="$textPartInfo1{content_type}" type="string">"text/plain"</assign>
    <assign to="$textPartInfo1{content}" type="string">"A simple text value"</assign>
    <!--
        Put all parts in a list.
    -->
    <assign to="$parts" append="true">$filePartInfo1</assign>
    <assign to="$parts" append="true">$filePartInfo2</assign>
    <assign to="$parts" append="true">$textPartInfo1</assign>
    <!--
        Send the request.
    -->
    <btxn from="Sender" to="Receiver" txnId="t1" handler="HttpMessaging"/>
    <send desc="Send file" from="Sender" to="Receiver" txnId="t1">
        <config name="http.method">POST</config>
        <input name="http_parts">$parts</input>
    </send>
    <etxn txnId="t1"/>
</steps>

HttpsMessaging

Used to send or receive content over HTTPS.

Note

Deprecation of HttpsMessaging: As of release 1.4.1 handler HttpsMessaging is deprecated in favour of the more flexible HttpMessaging which can now be configured to support HTTPS.

Element name Element type Required? Type Description
http_headers Input No map The map of HTTP headers to send.
http_body Input No binary The HTTP request body’s bytes.
http_method Output No string The HTTP method.
http_version Output No string The HTTP version.
http_uri Output No string The HTTP request path.
http_headers Output No map The map of received headers.
http_body Output No binary The bytes of the received body.
network.host Actor configuration Yes string The host of the actor.
network.port Actor configuration Yes number The listen port for the actor.
http.uri Actor configuration No string The request path for the request.
status.code Receive configuration No string The status code for responses.
http.method Send configuration Yes string The HTTP method to use when sending.
http.uri.extension Send configuration No string HTTP URI extension for the address.
status.code Send configuration No string Status for responses.
<btxn from="Actor1" to="Actor2" txnId="t1" handler="HttpsMessaging"/>
<send id="dataSend" desc="Send data" from="Actor1" to="Actor2" txnId="t1">
    <config name="http.method">"POST"</input>
    <config name="http.uri.extension">"/path/to/service"</input>
    <input name="http_body">$binaryContent</input>
</send>
<receive id="dataReceive" desc="Receive data" from="Actor2" to="Actor1" txnId="t1">
    <config name="status.code">"200"</input>
</receive>
<etxn txnId="t1"/>

Note

Isolating communications: Handler HttpsMessaging builds upon the mechanism of HttpMessaging to isolate test session communications when receiving data. Check it’s documentation on what is needed to achieve this.

HttpProxyMessaging

Used to proxy HTTP requests and responses between two actors.

Element name Element type Required? Type Description
request_data Input No map The map of data to consider. Contains the http_method, http_path, http_body, http_headers inputs from the HttpMessaging handler.
http_method Output No string The HTTP method.
http_version Output No string The HTTP version.
http_path Output No string The HTTP request path.
network.host Actor configuration Yes string The host of the actor.
network.port Actor configuration Yes number The listen port for the actor.
proxy.address Send configuration No string Address of the proxied service.

In this case the request_data input map is defined as a convenience considering that we will always be receiving a call that we want to proxy to a final destination. The HTTP-related parameters to send to the destination need to match the initial parameters received.

<btxn from="Actor1" to="Actor2" txnId="t1" handler="HttpProxyMessaging"/>
<receive id="receiveData" desc="Receive call" from="Actor1" to="Actor2" txnId="t1" />
<send desc="Send call" from="Actor2" to="Actor1" txnId="t1">
    <config name="proxy.address">http://PROXIED_SERVICE_ADDRESS</config>
    <input name="request_data" source="$receiveData" />
</send>
<etxn txnId="t1"/>

Embedded processing handlers

Base64Processor

Used to manipulate Base64-encoded content for use in test cases. This processing handler supports but does not require a processing transaction to be established. The following operations are supported:

Operation Description Input(s) Output(s)
encode Receive a binary input and return a string with its Base64-encoded representation. Yes A string named output in the resulting step’s map.
decode Receive a string input that is Base64-encoded and return the binary output it corresponds to. Yes A binary value named output in the resulting step’s map.

The input parameters expected by the different operations are as follows:

Operation Input name Required? Description
encode input Yes The binary value that will be encoded as a Base64 string.
encode dataUrl No A boolean flag that indicates whether or not the output should be formatted as a data URL (default is false).
decode input Yes The string value (expected to be Base64-encoded or formatted as a data URL) that will be processed to return its corresponding binary value.

Base64 encoding is a technique often used to represent arbitrary byte sequences as text. Using this processing handler you can work with Base64 encoded texts that need to be decoded in test cases, but also encode binary content where this is needed. In both the encoding and decoding steps there is support for Base64 content and also data URLs. Data URLs are commonly used in web representations for the inline definition of binary resources. A data URL is essentially the Base64-encoded bytes prefixed with the content’s mime type as data:[mime type],base64,[BASE64 encoded string] (e.g. data:application/xml;base64,YXNoZGl1cXcgaGRva...).

The following examples illustrate use of this handler to work with Base64 encoding:

<!--
    Encode the binary variable "aBinaryVariable" and return the encoded string as "data1{output}".
-->
<process id="data1" handler="Base64Processor">
    <operation>encode</operation>
    <input name="input">$aBinaryVariable</input>
</process>
<!--
    Encode the binary variable "aBinaryVariable" and return the encoded string as "data2{output}".
    The result in this case is formatted as a data URL.
-->
<process id="data2" handler="Base64Processor">
    <operation>encode</operation>
    <input name="input">$aBinaryVariable</input>
    <input name="dataUrl">'true'</input>
</process>
<!--
    Decode a Base-64 encoded string to return its binary equivalent as "data3{output}". In this case
    the result will be identical to the "aBinaryVariable" variable used in the first step.
-->
<process id="data3" handler="Base64Processor">
    <operation>decode</operation>
    <input name="input">$data1{output}</input>
</process>
<!--
    Decode a Base-64 encoded string to return its binary equivalent as "data4{output}". In this example
    the handler is provided the data URL produced in the second step and will result in the same output
    as "data3" that matches the original input ("aBinaryVariable").
-->
<process id="data4" handler="Base64Processor">
    <operation>decode</operation>
    <input name="input">$data2{output}</input>
</process>

TokenGenerator

Used to generate tokens that can be used as data in test cases. This processing handler supports but does not require a processing transaction to be established. The following operations are supported:

Operation Description Input(s) Output(s)
uuid Generate a random UUID text value matching a Java UUID (e.g. “123e4567-e89b-12d3-a456-556642440000”). This is a value that can be considered as unique for test purposes. No A string named value in the resulting step’s map.
timestamp Generate a timestamp for the current or a provided time based on a format string. Yes A string named value in the resulting step’s map.
string Generate a text token with potentially fixed and/or random parts to match a provided regular expression. Yes A string named value in the resulting step’s map.

The input parameters expected by the different operations are as follows:

Operation Input name Required? Description
timestamp format No The formatting pattern to apply provided as a string matching the Java date/time formatting specifications (see Formatting configuration). If unspecified the current Epoch milliseconds are returned.
timestamp zone No The timezone to consider when generating a formatted timestamp provided as a string. Expected values are those defined by Java (see Timezone codes). If unspecified the default consider is UTC.
timestamp time No A number representing the Epoch milliseconds to use as the date/time to format. If unspecified the current date/time is used.
timestamp diff No A number representing the milliseconds to consider as a diff from the considered time. This value (default 0) is added to the considered time before formatting (i.e. a negative value signals an earlier time).
string format Yes A regular expression acting as a template to determine the generated token’s format.

A typical use case for the TokenGenerator is to generate text tokens that can be used in test cases either as input parameters to e.g. messaging calls (see Handler inputs and outputs) or as values to replace in loaded text templates (see Expressions and templates). The uuid operation provides a random and unique identifier where special formatting is not required, whereas the timestamp operation generates a timestamp string that includes date/time values but can also have fixed parts (e.g. if you need to generate a text token with a fixed part and a variable part based on the current date/time). Finally, the string operation is noteworthy as it can be used to generate any kind of text token with both fixed and random parts. The template to consider for the output is provided as a regular expression with the value to be returned being a random string to match it.

The examples that follow illustrate use of these operations to generate a series of tokens that are then presented to the user by means of an interact step. Note in all cases how the produced value is retrieved from the map resulting from the process step that is named based on the steps’ id. The value itself is retrieved from within each map under the value key:

<!--
    Generate a UUID.
-->
<process id="uuid" handler="TokenGenerator">
    <operation>uuid</operation>
</process>
<!--
    Generate a timestamp for the current time without specifying formatting.
    Example output would be "1560238501040".
-->
<process id="defaultTimestamp" handler="TokenGenerator">
    <operation>timestamp</operation>
</process>
<!--
    Generate a timestamp for the current time with provided formatting.
    Example output would be "DATE[2019-05-22] TIME[11:48:06]".
-->
<process id="formattedTimestamp" handler="TokenGenerator">
    <operation>timestamp</operation>
    <input name="format">"'DATE['yyyy-MM-dd'] TIME['HH:mm:ss']'"</input>
</process>
<!--
    Generate an XML timestamp for the current time.
-->
<process id="formattedTimestamp" handler="TokenGenerator">
    <operation>timestamp</operation>
    <input name="format">"yyyy-MM-dd'T'HH:mm:ss.SSSXXX"</input>
</process>
<!--
    Generate an XML timestamp for the current time but expressed in the GMT+2 timezone.
-->
<process id="formattedTimestamp" handler="TokenGenerator">
    <operation>timestamp</operation>
    <input name="format">"yyyy-MM-dd'T'HH:mm:ss.SSSXXX"</input>
    <input name="zone">"GMT+2"</input>
</process>
<!--
    Generate a timestamp for the provided time and formatting.
    The output would be "2014-05-11".
-->
<process id="formattedTimestampProvidedTime" handler="TokenGenerator">
    <operation>timestamp</operation>
    <input name="time">'1399792366000'</input>
    <input name="format">"yyyy-MM-dd"</input>
</process>
<!--
    Generate a timestamp for the current time minus one minute (600000 milliseconds) using the provided formatting.
    Example output would be "2019-06-11 10:23:10".
-->
<process id="formattedTimestampDiff" handler="TokenGenerator">
    <operation>timestamp</operation>
    <input name="diff">-600000</input>
    <input name="format">"yyyy-MM-dd HH:mm:ss"</input>
</process>
<!--
    Obtain the current time (T) and then generate two timestamps:
    - T minus one hour.
    - T plus one hour.
-->
<process id="now" handler="TokenGenerator">
    <operation>timestamp</operation>
</process>
<process id="nowMinusOneHour" handler="TokenGenerator">
    <operation>timestamp</operation>
    <input name="time">$now{value}</input>
    <input name="diff">-3600000</input>
    <input name="format">"yyyy-MM-dd HH:mm:ss"</input>
</process>
<process id="nowPlusOneHour" handler="TokenGenerator">
    <operation>timestamp</operation>
    <input name="time">$now{value}</input>
    <input name="diff">3600000</input>
    <input name="format">"yyyy-MM-dd HH:mm:ss"</input>
</process>
<!--
    Generate a random string with 2 characters followed by 10 digits.
    Example output would be "cD6723820231".
-->
<process id="stringRandom" handler="TokenGenerator">
    <operation>string</operation>
    <input name="format">"[a-zA-Z]{2}\d{10}"</input>
</process>
<!--
    Generate a random string:
    - Starting with "PREFIX" and ending with "POSTFIX".
    - With random parts of (a) 5 digits, (b) 5 occurences of 'a', 'b' or 'c', and (c) 2 digits.
    - With hyphens between all fixed and random parts.
    Example output would be "PREFIX-32145-abcaa-02-POSTFIX".
-->
<process id="stringRandomAndFixed" handler="TokenGenerator">
    <operation>string</operation>
    <input name="format">"PREFIX-\d{5}-[abc]{5}-\d{2}-POSTFIX"</input>
</process>
<!--
    Display all generated tokens to the user.
-->
<interact desc="Generated tokens">
    <instruct desc="UUID:">$uuid{value}</instruct>
    <instruct desc="The default timestamp:">$defaultTimestamp{value}</instruct>
    <instruct desc="A formatted timestamp:">$formattedTimestamp{value}</instruct>
    <instruct desc="A formatted timestamp for provided time:">$formattedTimestampProvidedTime{value}</instruct>
    <instruct desc="A timestamp using a diff:">$formattedTimestampDiff{value}</instruct>
    <instruct desc="Now minus one hour:">$nowMinusOneHour{value}</instruct>
    <instruct desc="Now plus one hour:">$nowPlusOneHour{value}</instruct>
    <instruct desc="A random string:">$stringRandom{value}</instruct>
    <instruct desc="A random string with fixed parts:">$stringRandomAndFixed{value}</instruct>
</interact>

Note

Timestamps for use in XML content: Formatted timestamps generated for use in XML content should match the formatting of the ISO 8601 version of the W3C XML Schema dateTime definition. The pattern to apply to get a XSD-valid timestamp is: yyyy-MM-dd'T'HH:mm:ss.SSSXXX.

Embedded validation handlers

NumberValidator

Used to verify that a provided number matches an expected value.

Input name Required? Type Description
actualnumber Yes number The value to check.
expectednumber Yes number The expected value.
<verify handler="NumberValidator" desc="Check number">
    <input name="actualnumber">$aNumber</input>
    <input name="expectednumber">'10'</input>
</verify>

StringValidator

Used to verify that a provided string matches an expected value.

Input name Required? Type Description
actualstring Yes string The value to check.
expectedstring Yes string The expected value.
<verify handler="StringValidator" desc="Check string">
    <input name="actualstring">$aString</input>
    <input name="expectedstring">'expected_string'</input>
</verify>

RegExpValidator

Used to verify that a provided string matches a regular expression.

Input name Required? Type Description
input Yes string The value to check.
expression Yes string The expression to match.
<verify handler="RegExpValidator" desc="Check string">
    <input name="input">$aString</input>
    <input name="expression">'^REF\-\d+$'</input>
</verify>

XPathValidator

Used to evaluate an XPath 3.0 expression against a provided XML document. The result of the expression needs to evaluate to a boolean (i.e. true for success or false for failure).

Input name Required? Type Description
xmldocument Yes object The XML document upon which the XPath expression will be evaluated.
xpathexpression Yes string The XPath 3.0 expression passed as a string.

An important note here is that the XPath expression passed in xpathexpression is meant to be a string. This means that to run an expression as-is you need to wrap it in quotes. This is because the content of the input element can also be an expression that you want to evaluate to give you the final expression to use. The following example illustrates both cases:

<!--
    Pass a string as the expression to use.
-->
<verify handler="XPathValidator" desc="Check document">
    <input name="xmldocument">$myDocument</input>
    <input name="xpathexpression">"contains(/toc/text(), 'string to look for')"</input>
</verify>
<!--
    Evaluate an expression that will give you the final expression to use.
-->
<verify handler="XPathValidator" desc="Check document">
    <input name="xmldocument">$myDocument</input>
    <input name="xpathexpression">concat("contains(/toc/text()", ", 'string to look for')")</input>
</verify>

XSDValidator

Used to validate an XML document against an XML Schema (XSD) instance.

Input name Required? Type Description
xsddocument Yes schema The XSD to validate the document against.
xmldocument Yes object The XML document to validate.
<verify handler="XSDValidator" desc="Validate content">
    <input name="xmldocument">$docToValidate</input>
    <input name="xsddocument">$schemaFile</input>
</verify>

SchematronValidator

Used to validate an XML document against a Schematron file.

Input name Required? Type Description
schematron Yes schema The Schematron file to use for the validation (XSTL or SCH).
xmldocument Yes object The XML document to validate.
<verify handler="SchematronValidator" desc="Validate content">
    <input name="xmldocument">$docToValidate</input>
    <input name="schematron">$schematronFile</input>
</verify>

XmlMatchValidator

Used to validate an XML document by matching it against a provided template.

Input name Required? Type Description
xml Yes object The XML file to validate.
template Yes object The XML file to consider as the validation’s template.
ignoredPaths No list[string] An optional list of paths provided as XPath expressions identifying sections of the XML to ignore.

The matching process takes place by normalising whitespace, ignoring comments and tolerating naming differences in namespace prefixes. In addition, texts of elements or attributes in the provided template can be specified with the special value ?. This means that any value will be allowed for this element or attribute and will be ignored as part of the matching (e.g. to ignore random tokens, timestamps, or texts with no expected value).

In case you want to ignore complete XML sections you may use the ignoredPaths attribute. This allows you to define one or more paths that identify elements that will, themselves and for all children, be ignored. For each provided path the following constraints apply:

  • It must be formed as a namespace-aware XPath expression considering the namespace prefixes of the provided template.
  • It must identify a specific element, rather than a set of elements, a text node or an attribute.
  • It must be a simple element-based path with no functions, selectors or wildcards.

The following example illustrates how this validator can be used:

<!--
    Validate an XML file based on a provided template.
-->
<verify handler="XmlMatchValidator" desc="Validate content">
    <input name="xml">$docToValidate</input>
    <input name="template">$templateFile</input>
</verify>
<!--
    Another validation that also defines a set of paths to ignore.
    Variable "pathsToSkip" is of type list[string].
-->
<assign to="$pathsToSkip" append="true">"/x:Invoice/x:BillingInformation/y:Comments"</assign>
<verify handler="XmlMatchValidator" desc="Validate content">
    <input name="xml">$docToValidate</input>
    <input name="template">$templateFile</input>
    <input name="ignoredPaths">$pathsToSkip</input>
</verify>

Authentication for external handlers

Handlers defined as external service implementations may need to be protected with access control. To support such protected services, the GITB software foresees the possibility to authenticate as part of each service call. Authentication information needs to be configured before any exchanges take place with the service and as such, cannot use the config and input elements otherwise used to pass information. Authentication configuration is handled with property elements that are used as part of the handler setup in:

  • The btxn step for messaging services.
  • The bptxn step for processing services.
  • The verify step for messaging services.

The authentication possibilities currently supported are:

  • Basic HTTP authentication for all calls to the service’s HTTP/HTTPS endpoint. This is authentication at the transport layer.
  • Authentication using the WS-Security UsernameToken profile (see here), supporting text and digest password transmission with timestamps and nonces. This is authentication at the SOAP application layer.

The properties that are supported in the property elements are listed in the following table:

Property name Value Description
auth.basic.username Any string The username to provide when prompted for basic HTTP authentication.
auth.basic.password Any string The password to provide when prompted for basic HTTP authentication.
auth.token.username Any string The username to include in the SOAP header as the UsernameToken’s username.
auth.token.password Any string The password to include in the SOAP header as the UsernameToken’s password.
auth.token.password.type ‘DIGEST’ (the default) or ‘TEXT’ The way the password is to be serialised in the header. ‘DIGEST’ includes it as a DIGEST whereas ‘TEXT’ adds it in plaintext.

Note that use of HTTP basic authentication and the UsernameToken are not necessarily exclusive. A case where both are provided would be where a service protects access to its WSDL using HTTP basic authentication and adds additional protection for SOAP service calls by means of a UsernameToken. Combining both approaches is rare but possible. The following example illustrates use of these authentication properties calling various test services:

<!--
    Messaging service authentication with UsernameToken (DIGEST).
-->
<btxn from="Sender" to="Receiver1" txnId="t1" handler="$messagingServiceURL">
    <property name="auth.token.username">$DOMAIN{serviceUsername1}</property>
    <property name="auth.token.password">$DOMAIN{servicePassword1}</property>
    <property name="auth.token.password.type">DIGEST</property>
</btxn>
<send id="dataSend" desc="Send message" from="Sender" to="Receiver1" txnId="t1"/>
<etxn txnId="t1"/>
<!--
    Validation service authentication with UsernameToken (DIGEST - the default) and HTTP basic authentication.
-->
<verify handler="$validationService1" desc="Validate content">
    <property name="auth.basic.username">$DOMAIN{serviceUsername2}</property>
    <property name="auth.basic.password">$DOMAIN{servicePassword2}</property>
    <property name="auth.token.username">$DOMAIN{serviceUsername3}</property>
    <property name="auth.token.password">$DOMAIN{servicePassword3}</property>
    <input name="content">$contentToValidate</input>
</verify>
<!--
    Processing service authentication with HTTP basic authentication.
-->
<bptxn txnId="t1" handler="$processingServiceURL">
    <property name="auth.basic.username">$DOMAIN{serviceUsername4}</property>
    <property name="auth.basic.password">$DOMAIN{servicePassword4}</property>
</bptxn>
<process id="result" txnId="t1">
    <operation>action</operation>
    <input name="anInput">$aValue</input>
</process>
<eptxn txnId="t1"/>
<!--
    Validation service authentication with UsernameToken (TEXT) authentication.
-->
<verify handler="$validationService2" desc="Validate content">
    <property name="auth.token.username">$DOMAIN{serviceUsername5}</property>
    <property name="auth.token.password">$DOMAIN{servicePassword5}</property>
    <property name="auth.token.password.type">TEXT</property>
    <input name="content">$contentToValidate</input>
</verify>

Handler inputs and outputs

The input and output elements used with handlers are what GITB refers to as “Binding elements”. They share the following structure:

Name Required? Description
@name no The name of the input or output element.
@lang no The expression language that should be considered when evaluating its contained expression (see Expressions).
@source no A pure variable reference identifying a source variable. Used as the target upon which to evaluate the contained expression.
@asTemplate no Whether or not the result will be considered as a template for placeholder replacement (see Expressions and templates). By default this is “false”.

The text content of the element is considered to be an expression (see Expressions). In the case a source attribute is provided the contained expression is evaluated on the variable identified by source to produce the value. If no source attribute is present the value is the result of the expression itself. For inputs of type object or schema (i.e. XML documents) the source attribute can also be used to pass the complete document as the value. In this case use of the source attribute to reference the relevant variable is equivalent to specifying its reference as the expression:

<verify handler="SchematronValidator" desc="Validate content">
    <!--
        Pass document through the expression.
    -->
    <input name="xmldocument">$docToValidate</input>
    <!--
        Pass document through the source attribute.
    -->
    <input name="schematron" source="$schematronFile"/>
</verify>

Note

Specifying a fixed value: Considering that the default expression language is XPath 1.0, a fixed text value is provided by enclosing it in quotes. See Expressions for further details.

The input and output options for service handlers are documented as part of their module definition. For handlers accessible via remote web service calls this information is returned when calling the handler’s getModuleDefinition operation. This is also used internally by the test bed before calling a service handler to ensure that required parameters are provided by the test case.