Intercept and mock outgoing http/https requests
npm install @gr2m/http-interceptor
import httpInterceptor from "@gr2m/http-interceptor";
httpInterceptor.start();
httpInterceptor.on("connect", (socket, options, bypass) => {
// call bypass() to continue the unintercepted request
if (options.host === "db.example.com") return bypass();
});
httpInterceptor.on("request", (request, response) => {
response.end("Hello World!");
});httpInterceptor is a singleton API.
Hooks into the request life cycle and emits connect events for each request that connects to a server as well as request events for all intercepted requests.
Stops intercepting. No connect or request events will be emitted.
The listener callback is called with 3 arguments
socket: the intercepted net or TLS socketoptions: socket options:{port, /* host, localAddress, localPort, family, allowHalfOpen */}bypass: a function to call to continue the unintercepted connection
The listener callback is called with 2 arguments
request:Http.IncomingMessageresponse:Http.ServerResponse
It's the same arguments as e.g. http.createServer(listener) receives.
Remove an event listener.
Removes all event listeners for the given event. Or when called without the event argument, remove all listeners for all events.
@gr2m/net-interceptor- Intercept outgoing network TCP/TLS connections@gr2m/http-recorder- Library agnostic in-process recording of http(s) requests and responses
@gr2m/http-interceptor is using @gr2m/net-interceptor to intercept TCP/TLS connections, and to permit to bypass the interception.
@gr2m/http-interceptor also hooks into http.ClientRequest.prototype.onSocket which is called in the http.ClientRequest constructor. Each time http.ClientRequest is instantiated with a socket, we check if the socket is intercepted and if so, emit the request event with a request/response pair for mocking.
See CONTRIBUTING.md
@gr2m/http-interceptor is built upon code and concepts from moll/node-mitm by Andri Möll. Monday Calendar supported that engineering work.
Gregor Martynus removed all http(s)-related code and made its focus on intercepting connections that use the lower-level net and tls modules.