Skip to main content

HTTP server for testing environments

Project description

https://github.com/lexsca/spoof/actions/workflows/checks.yml/badge.svg https://img.shields.io/pypi/v/spoof.svg https://img.shields.io/pypi/pyversions/spoof.svg https://img.shields.io/github/license/lexsca/spoof.svg https://img.shields.io/badge/code%20style-black-000000.svg

Spoof is an HTTP server written in Python for use in test environments where mocking underlying calls isn’t an option, or where it’s desirable to have an actual HTTP server listening on a socket. Hello, functional tests!

Unlike a typical HTTP server, where specific method and path combinations are configured in advance, Spoof accepts all requests and sends either a queued response, a default response if the queue is empty, or an error response if no default response is configured. Requests can be inspected after a response is sent.

Compatibility

Spoof runs on Python 2.7, 3.5 to 3.11, and has no external dependencies.

Multiple Spoof HTTP servers can be run concurrently, and by default, the port number is the next available unused port. With OpenSSL installed, Spoof can also provide an SSL/TLS HTTP server. IPv6 is fully supported.

Quickstart

Queue multiple responses, verify content, and request paths:

import requests
import spoof

with spoof.HTTPServer() as httpd:
    responses = [
        [200, [('Content-Type', 'application/json')], '{"id": 1111}'],
        [200, [('Content-Type', 'application/json')], '{"id": 2222}'],
    ]
    httpd.queueResponse(*responses)
    httpd.defaultResponse = [404, [], 'Not found']

    assert requests.get(httpd.url + '/path').json() == {'id': 1111}
    assert requests.get(httpd.url + '/alt/path').json() == {'id': 2222}
    assert requests.get(httpd.url + '/oops').status_code == 404
    assert [r.path for r in httpd.requests] == ['/path', '/alt/path', '/oops']

Set a callback as the default response:

import requests
import spoof

with spoof.HTTPServer() as httpd:
    httpd.defaultResponse = lambda request: [200, [], request.path]

    assert requests.get(httpd.url + '/alt').content == b'/alt'

Test queued response with SSL:

import requests
import spoof

with spoof.SelfSignedSSLContext() as selfSigned:
    with spoof.HTTPServer(sslContext=selfSigned.sslContext) as httpd:
        httpd.queueResponse([200, [], 'No self-signed cert warning!'])
        response = requests.get(httpd.url + '/path',
                                verify=selfSigned.certFile)

        assert httpd.requests[-1].method == 'GET'
        assert httpd.requests[-1].path == '/path'
        assert response.content == b'No self-signed cert warning!'

SSL Warnings

Some libraries like Requests will complain loudly or refuse to connect to HTTP servers with a self-signed SSL certificate. The preferred way to handle this is to use the verify property in requests.Session to trust the certificate:

import requests
import spoof

cert, key = spoof.SSLContext.createSelfSignedCert()
sslContext = spoof.SSLContext.fromCertChain(cert, key)
httpd = spoof.HTTPServer(sslContext=sslContext)
httpd.queueResponse([200, [], 'OK'])
httpd.start()

# trust self-signed certificate
session = requests.Session()
session.verify = cert

response = session.get(httpd.url + '/uri/path')
print(response.status_code, response.content)
httpd.stop()

If verifying the certificate is not an option, another way to work around this is to monkeypatch the requests library in the testing code. For example:

import requests

certVerify = requests.adapters.HTTPAdapter.cert_verify
def certNoVerify(self, conn, url, verify, cert):
    return certVerify(self, conn, url, False, cert)
requests.adapters.HTTPAdapter.cert_verify = certNoVerify
requests.packages.urllib3.disable_warnings()

Another common case is libraries that leverage ssl directly. One way to work around this is to globally set the default context to unverified. For example:

import ssl

try:
    createUnverifiedHttpsContext = ssl._create_unverified_context
except AttributeError:
    # ignore if ssl context not verified by default
    pass
else:
    ssl._create_default_https_context = createUnverifiedHttpsContext

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

spoof-1.5.3.tar.gz (23.1 kB view details)

Uploaded Source

Built Distribution

spoof-1.5.3-py2.py3-none-any.whl (10.5 kB view details)

Uploaded Python 2Python 3

File details

Details for the file spoof-1.5.3.tar.gz.

File metadata

  • Download URL: spoof-1.5.3.tar.gz
  • Upload date:
  • Size: 23.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.11.0

File hashes

Hashes for spoof-1.5.3.tar.gz
Algorithm Hash digest
SHA256 af3d65d78a804cad3924ef0cbe78ae51672512069d273836fedc0005c9cee8ca
MD5 b6dbe7c891dab977be4e913fcea32067
BLAKE2b-256 f45b1bd89b98563cd5599578c8981aafbb90745e2b7255ec7d035af8ec0f1363

See more details on using hashes here.

File details

Details for the file spoof-1.5.3-py2.py3-none-any.whl.

File metadata

  • Download URL: spoof-1.5.3-py2.py3-none-any.whl
  • Upload date:
  • Size: 10.5 kB
  • Tags: Python 2, Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.11.0

File hashes

Hashes for spoof-1.5.3-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 89884d12f6b7f9a82b860eac205e1ddbeaaee0753b70e3ea8912d3b25620200d
MD5 ad030fb9841557f843bfcb17031c0aa6
BLAKE2b-256 7a43feff4c33ad499b27756cb19fa6e8baabf76778fc42b1fa3595d7633471f5

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page