Host 3270 Adaptor example
Description
Through the Host Adaptor, H-TEST connects with a 3270 Host to perform tests into it. It’s possible to perform single tests with this adaptor or end to end tests connecting with other adaptors either.
it is a simple navigation on a main menu (see bank accounts and data of that type)
UML Diagram and Mapping
This is an example of a UML Diagram which uses the Host Adaptor.
NECESITO IMAGEN
This is an example of interactions between the 3270 Host Adaptor with other adaptors in an E2E test.
NECESITO IMAGEN
As part of the mapping process, you should provide the Adaptor’s information, regarding to connect and use it:
-
Host: name of the machine or IP address. Required. SESSION_HOST.
-
Port: connection port. Required.SESSION_HOST_POST.
-
LU Name: name of the connection LU, optional.
-
Enhanced: indicates whether the Enhanced protocol is used. (by default is not checked). SESSION_TN_ENHANCED.
-
Telnet_Negotiated: the telnet information.
-
Server Authentication: Information of authentication to the 3270 Server.
-
Client_Certificate_Autentication: certificate for Authentication.
-
Personal Certification: personal certificate for Authentication.
-
Personal Certificate File Path: path to the Certificate for Authentication.
-
Personal Certificate pass: pass to the Certificate for Authentication.
-
Certificate Name: name of the Certificate.
-
Certificate Pass: pass to the Certificate.
-
Certificate Source: source to the Certificate.
-
Certificate URL: url to Certificate.
-
Prompt_Required: promptRequired.
-
Certificate_Based_Keys: certificate Based Keys.
-
SSL: SSL.
-
KeyStore_FilePath: keyStore File Path.
-
P12_FilePath: P12 File Path.
-
KeyStore_Pass: keyStore Pass.
-
Certificate_Trusted: certificate for Authentication.
-
Code_Page: code Page. By default it is INTERNAL – Built-in EBCDIC conversion (CP037).
-
Session_Type: session Type.
-
Security_Type: security Type.
-
Protocol: protocol.
-
Protocol_Version: protocol Version.
-
Certificate Type: certificate Type.
Test Set Execution
After the test set execution, immediately you have the results. There are two main elements you can verify:
-
Logs: the step by step information of the execution, with:
-
the results.
-
the methods had been executed.
-
the timelines.
-
-
Evidences: the screenshots or evidence information by step, in case they have requested.