Skip to main content

HTTP server for testing environments

Project description

https://github.com/lexsca/spoof/actions/workflows/checks.yml/badge.svg https://img.shields.io/pypi/v/spoof.svg https://img.shields.io/pypi/pyversions/spoof.svg https://img.shields.io/github/license/lexsca/spoof.svg https://img.shields.io/badge/code%20style-black-000000.svg

Spoof is an HTTP server written in Python for use in test environments where mocking underlying calls isn’t an option, or where it’s desirable to have an actual HTTP server listening on a socket. Hello, functional tests!

Unlike a typical HTTP server, where specific method and path combinations are configured in advance, Spoof accepts all requests and sends either a queued response, a default response if the queue is empty, or an error response if no default response is configured. Requests can be inspected after a response is sent.

Compatibility

Spoof is tested on Python 3.10 to 3.14, and has no external dependencies. It may also work on older versions of Python, but this is not supported.

Multiple Spoof HTTP servers can be run concurrently, and by default, the port number is the next available unused port. With OpenSSL installed, Spoof can also provide an SSL/TLS HTTP server. IPv6 is fully supported.

Quickstart

Queue multiple responses, verify content, and request paths:

import requests
import spoof

with spoof.HTTPServer() as httpd:
    responses = [
        [200, [('Content-Type', 'application/json')], '{"id": 1111}'],
        [200, [('Content-Type', 'application/json')], '{"id": 2222}'],
    ]
    httpd.queueResponse(*responses)
    httpd.defaultResponse = [404, [], 'Not found']

    assert requests.get(httpd.url + '/path').json() == {'id': 1111}
    assert requests.get(httpd.url + '/alt/path').json() == {'id': 2222}
    assert requests.get(httpd.url + '/oops').status_code == 404
    assert [r.path for r in httpd.requests] == ['/path', '/alt/path', '/oops']

Set a callback as the default response:

import requests
import spoof

with spoof.HTTPServer() as httpd:
    httpd.defaultResponse = lambda request: [200, [], request.path]

    assert requests.get(httpd.url + '/alt').content == b'/alt'

Test queued response with SSL:

import requests
import spoof

with spoof.SelfSignedSSLContext() as selfSigned:
    with spoof.HTTPServer(sslContext=selfSigned.sslContext) as httpd:
        httpd.queueResponse([200, [], 'No self-signed cert warning!'])
        response = requests.get(httpd.url + '/path',
                                verify=selfSigned.certFile)

        assert httpd.requests[-1].method == 'GET'
        assert httpd.requests[-1].path == '/path'
        assert response.content == b'No self-signed cert warning!'

SSL Warnings

Some libraries like Requests will complain loudly or refuse to connect to HTTP servers with a self-signed SSL certificate. The preferred way to handle this is to use the verify property in requests.Session to trust the certificate:

import requests
import spoof

cert, key = spoof.SSLContext.createSelfSignedCert()
sslContext = spoof.SSLContext.fromCertChain(cert, key)
httpd = spoof.HTTPServer(sslContext=sslContext)
httpd.queueResponse([200, [], 'OK'])
httpd.start()

# trust self-signed certificate
session = requests.Session()
session.verify = cert

response = session.get(httpd.url + '/uri/path')
print(response.status_code, response.content)
httpd.stop()

If verifying the certificate is not an option, another way to work around this is to monkeypatch the requests library in the testing code. For example:

import requests

certVerify = requests.adapters.HTTPAdapter.cert_verify
def certNoVerify(self, conn, url, verify, cert):
    return certVerify(self, conn, url, False, cert)
requests.adapters.HTTPAdapter.cert_verify = certNoVerify
requests.packages.urllib3.disable_warnings()

Another common case is libraries that leverage ssl directly. One way to work around this is to globally set the default context to unverified. For example:

import ssl

try:
    createUnverifiedHttpsContext = ssl._create_unverified_context
except AttributeError:
    # ignore if ssl context not verified by default
    pass
else:
    ssl._create_default_https_context = createUnverifiedHttpsContext

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

spoof-1.5.4.tar.gz (16.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

spoof-1.5.4-py3-none-any.whl (10.7 kB view details)

Uploaded Python 3

File details

Details for the file spoof-1.5.4.tar.gz.

File metadata

  • Download URL: spoof-1.5.4.tar.gz
  • Upload date:
  • Size: 16.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.3

File hashes

Hashes for spoof-1.5.4.tar.gz
Algorithm Hash digest
SHA256 c40063b7b369a1c557cb8661b4da649df1097231b89f671706df2a0f234b7092
MD5 bea1ab74b8259fd5677df7366a9e2cf8
BLAKE2b-256 4ea3d6d7614355b276d2f02120c7cd29bacf4dd0a98d3ce06df395525463ef00

See more details on using hashes here.

File details

Details for the file spoof-1.5.4-py3-none-any.whl.

File metadata

  • Download URL: spoof-1.5.4-py3-none-any.whl
  • Upload date:
  • Size: 10.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.3

File hashes

Hashes for spoof-1.5.4-py3-none-any.whl
Algorithm Hash digest
SHA256 90d0f4ed4a27e051c0fb7de05942a617080bf1f6843c0d55ca1a11b89823d797
MD5 e835eef79170d6728d43e8cfd6f82856
BLAKE2b-256 f3c611c64f46391266ed8694e1aa6a32baec83471fa94f700bf01207207cb130

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page