Skip to main content

Python library for testing HTTP proxies.

Project description


Deproxy is a tool for performing functional/regression testing of proxies, and other HTTP intermediaries. It is written in python, and the plan is to incorporate it into unittest-style test scripts for functional tests.

Testing normal client/server interaction is relatively straight-forward: Use a specialized test client to send requests to the server, and compare the response that the server returns to what it ought to return.::

________ ________
| Test | ---> req ---> | |
| Client | | Server |
|________| <--- resp <--- |________|

Proxies sit in-between an HTTP client (e.g. novaclient) and an HTTP server (e.g. the Nova API nodes). This makes testing a little more difficult.::

________ ________ ________
| | ---> req ---> | | ---> req2 ---> | |
| Client | | Proxy | | Server |
|________| <--- resp2 <-- |________| <--- resp <--- |________|

A proxy can modify either the incoming request to the server, or the outgoing response to the client, or both. In addition, it may handle the request itself (e.g. a cache or authenicator), and prevent it from reaching the server in the first place.
The functionality and positioning of the proxy provide more of a challenge to functionality testing.
The traditional model is not enough.
Because the test client only sees one side of the transaction, it can't make definitive determinations about the server's side of it. ::

________ ________ ________
| Test | ---> req ---> | | ---> ???? ---> | |
| Client | | Proxy | | Server |
|________| <--- resp2 <-- |________| <--- ???? <--- |________|

If we don't have a copy of the request that the server received, then we can't compare it to the request sent, which means we don't know for sure that the proxy is modifiying it correctly.
Likewise, if we don't have a copy of the response that the server originally sent, we can't make conclusively prove that the proxy is modifying responses correctly.
[Some specific cases don't have this problem, such as whether the proxy overwrites the "Server" header on a response; that can be confirmed because a response will only ever have one "Server" header, and that can easily be checked by the test client.]
But in the general case, we can't say for sure about other functional requirements.
Additionally, if the proxy is required to prevent a request from even reaching the server (as in the case of invalid authentication credentials in the request) the test client cannot determine whether any such request was in fact forwarded, because all it sees is the error response from the proxy.
For that, we'd need to be able see both sides of the exchange, and record all requests that made it to the server.
That is what Deproxy does.::

________ ________ ________
| | ---> req ---> | | ---> req2 ---> | |
| (C) | | Proxy | | (S) |
| | <--- resp2 <-- |________| <--- resp <--- | |
| | | |
| |_______________________________________________| |
| |
| Deproxy |

Deproxy acts as both the client and the server, and the proxy it is testing will forward requests from one side to the other.
Any requests received by the server side are matched up with the requests that started them.
A call to the Deproxy object's make_request method will return the request that the client side sent, the request that the server side received, the response that the server side sent, and the response that the client side received. In this way, we can conclusively prove whether or not the proxy modified requests and responses correctly. We can even conclusively show when no request makes it to the server in the first place, because the received_request and sent_response fields will be null.

But this is just scratching the surface. The Deproxy module contains additional tools and utilities for custom server responses, mocking, testing multiple endpoints, and more.

.. :changelog:


0.11 (in progress)

0.10 (2015-05-26)

- Preliminary HTTPS support.

0.9 (2015-05-19)

- Read message bodies encoded with the "chunked" transfer-encoding.

0.8 (2013-06-05)

- Rough preliminary support for using ssl for requests.
- Add "Content-Length: 0" header if no body is present on the request.

0.7 (2013-05-31)

- Changed the signature of ``add_endpoint`` so that the user can just pass a
port, instead of an ugly ``('localhost', port)`` tuple, when creating an
- Added the ability for the user to specify a default handler for a Deproxy via
the ``default_handler`` parameter to ``__init__``.
- Added the ability for the user to specify a default handler for a specific
endpoint via the ``default_handler`` parameter to ``add_endpoint``.
- Added the ability for the user to specify separate handlers for each endpoint
via the ``handlers`` parameter to ``make_request``.
- Renamed the ``make_request`` method's ``handler_function`` parameter to
- Renamed the ``MessageChain`` class's ``handler`` to ``default_handler``, to
avoid confusion with the new ``handlers`` attribute.
- Renamed the built-in ``default_handler`` function to ``simple_handler`` to
avoid confusion.
- Renamed the ``delay`` function's ``handler_function`` parameter to
``next_handler`` and made it optional, defaulting to ``simple_handler``.
- Stringified parameters to ``Request`` and ``Response``. They are always
converted to strings now. Also made some of them optional.
- Fixes to ``route``. It's still not 100%, though.

There are several breaking changes to method signatures. Upgrading existing
tests to use v0.7 will be tedious, but not difficult.

0.6 (2013-05-30)

- Added a class, ``HeaderCollection``, to hold request and response headers
instead of using a ``dict``. The new class is a hybrid of a dictionary and a
list of tuples. It supports case-insensitive lookup and storing multiple
values for headers with the same name.
- Updated reading of simple message bodies. It doesn't yet support chunked
transfers or encodings, but it's far more useful.
- Re-organized the codebase from a multi-file package into a single module.

0.5 (2013-05-16)

- Fixed the logic when adding default headers so that they are recorded in the
handlings as well.

0.4 (2013-05-16)

- Added option to ``make_request`` to not add default request headers
- Added option to handler functions to not add default response headers

Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

deproxy-0.10.tar.gz (18.4 kB view hashes)

Uploaded source

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page