blob: d68c2914d407ebbdfb1863c54aefb871bdcfea78 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.cocoon;
/**
* HtmlUnit TestCase for memory leak in internal requests (Bugzilla #26186).
*
* @version $Id: $
*/
public class Bug26186InternalRequestMemoryLeakTestCase
extends HtmlUnitTestCase
{
static final String pageurl = "/samples/blocks/xsp/java/resolver";
public void testMemoryLeak()
throws Exception
{
final int iterations = Integer.parseInt(System.getProperty("htmlunit.test.Bug26186InternalRequestMemoryLeak.iterations"));
final String phrase = "An XSP Page using a source";
for( int i = 0; i < iterations; i++ ) {
loadResponse(pageurl);
assertEquals("Status code", 200, response.getStatusCode());
assertTrue("Content should contain: "+phrase,
response.getContentAsString().indexOf(phrase) != -1);
if( (i+1)%100 == 0 ) {
logger.info("Memory leak checking "+(i+1)+" of "+iterations+" iterations");
}
}
}
}