Install Robot Framework with IronPython on Windows

… or how to get YOUR Robot Framework test-report in less than 10 minutes!


Installation architecture


Install Robot Framework from Source Code

1.) Download & install IronPython
2.) Install elementtree (because it’s broken in current IronPython:

cd C:\Program Files (x86)\IronPython 2.7
ipy install

3.) Install Robot Framework:

cd "C:\Program Files (x86)\robotframework-2.9"
"C:\Program Files (x86)\IronPython 2.7\ipy.exe" install

4.) Add

C:\Program Files (x86)\IronPython 2.7;

to the PATH-variable.
5.) Restart cmd & check for success:
cd "C:\Program Files (x86)\robotframework-2.9\src\bin"
ipybot --version


Run an example testcase

1.) Save

*** Test Cases ***
My Test
Should Be Equal 1 1

as Example.txt in C:\Program Files (x86)\robotframework-2.9\src\bin
2.) Execute in cmd:
ipybot Example.txt

Create a test-report

1.) Execute in cmd:
ipyrebot output.xml
2.) Open report.html and enjoy the result:
For more information on Robot Framework read:

Highlight element in Internet Explorer (xPath)

Because missing proper xPath tool support in Internet Explorer, you have to Do It Yourself.
It feels dirty, but you get used to it 😉
1.) Open in Internet Explorer & press F12 (to open developer tools)
2.) Open console-tab and execute following javascript:

var script = document.createElement("script");
script.src = "";

If prompted, decide for „Show all content“ …
… than execute this javascript again. If you are prompted again, then execute the javascript again. Do this as long as the prompt appears.
Choose your xPath and execute:

var xPath= ".//*[@title='Google']";
var myElement = document.evaluate(xPath, document, null, XPathResult.FIRST_ORDERED_NODE_TYPE, null).singleNodeValue;"3px solid red";"3px solid red";;"visible";"2147483647";"visible";

Et voila, your evaluation of Internet Explorer’s xPath:
My frist reader, who can add the scroll-to-that-element feature wins a backlink 😉

  1. If no element was found, the thrown exceptions may differ from time to time and are somehow cryptic. You have to get used to that.
  2. This hack was tested with Internet Explorer 9 & 11
  3. Find similar hacks:
  4. Supports working in test-automation, e.g. with Selenium