Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

git-http-mock-server

Package Overview
Dependencies
Maintainers
1
Versions
7
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

git-http-mock-server

Clone and push to git repository test fixtures over HTTP.

  • 2.0.0
  • latest
  • Source
  • npm
  • Socket score

Version published
Weekly downloads
285
decreased by-48.28%
Maintainers
1
Weekly downloads
 
Created
Source

git-http-mock-server / git-ssh-mock-server

FOSSA Status

Clone and push to git repository test fixtures over HTTP or SSH.

What it does

It is similar to git-http-server but designed for test cases only. It uses copy-on-write so that pushing to the repo doesn't actually alter the repo.

Run in a directory full of bare git repositories, git-http-mock-server will serve those repos using the native git-http-backend process built into git (which needs to be installed on the machine).

You can then:

  • run tests that clone or push to those git repositories (regardless of whether Github is down :wink:).
  • run those tests in parallel without them interfering with each other.

Git hooks such as hooks/update and hooks/post-receive are automatically supported.

It also supports HTTP Basic Auth password protection of repos so you can test how your code handles 401 errors.

Using isomorphic-git and testing things from browsers? Fear not, git-http-mock-server includes appropriate CORS headers.

git-ssh-mock-server is similar, but because authentication happens before the client can say which repo they are interested in, the authentication can't be customized per repository. By default it allows anonymous SSH access. You can disable anonymous access and activate password authentication by setting the GIT_SSH_MOCK_SERVER_PASSWORD evironment variable. (When password auth is activated, any username will work as long as the password matches the environment variable.) Alternatively, you can set the GIT_SSH_MOCK_SERVER_PUBKEY environment variable to true to disable anonymous access and activate Public Key authentication. What key to use is explained in detail later in this document.

How to use

npm install --save-dev git-http-mock-server

Now cd to a directory in which you have some bare git repos and run this server:

> cd __fixtures__
> ls
test-repo1.git    test-repo2.git   imaginatively-named-repo.git
> git-http-mock-server

Now in another shell, clone and push away...

> git clone http://localhost:8174/test-repo1.git
> git clone http://localhost:8174/test-repo2.git
> git clone http://localhost:8174/imaginatively-named-repo.git

To do the same thing but with SSH

> cd __fixtures__
> ls
test-repo1.git    test-repo2.git   imaginatively-named-repo.git
> git-ssh-mock-server

Now in another shell,

> git clone ssh://localhost:2222/imaginatively-named-repo.git

Run in the background

If you want to reuse the same shell (as part of a shell script, for example) you can run the server as a daemon in the background:

> git-http-mock-server start
> # do stuff
> git-http-mock-server stop

Just be sure to run start and stop from the same working directory. (The start command writes the PID of the server to ./git-http-mock-server.pid so that the stop command knows what process to kill.)

Same thing for SSH:

> git-ssh-mock-server start
> # do stuff
> git-ssh-mock-server stop

Environment Variables

  • GIT_HTTP_MOCK_SERVER_PORT default is 8174 (to be compatible with git-http-server)
  • GIT_HTTP_MOCK_SERVER_ROUTE default is /
  • GIT_HTTP_MOCK_SERVER_ROOT default is process.cwd()
  • GIT_HTTP_MOCK_SERVER_ALLOW_ORIGIN default is * (used for CORS)
  • GIT_SSH_MOCK_SERVER_PORT default is 2222
  • GIT_SSH_MOCK_SERVER_ROUTE default is /
  • GIT_SSH_MOCK_SERVER_ROOT default is process.cwd()
  • GIT_SSH_MOCK_SERVER_PASSWORD activate Password Authentication and use this password (leave blank to allow anonymous SSH access.)
  • GIT_SSH_MOCK_SERVER_PUBKEY activate PubKey Authentication using the self-generated keypair (leave blank to allow anonymous SSH access.)

.htpasswd support (http-only)

You can place an Apache-style .htpasswd file in a bare repo to protect it with Basic Authentication.

> cd __fixtures__/test-repo1.git
> htpasswd -cb .htpasswd testuser testpassword
Adding password for user testuser.
> cat .htpasswd
testuser:$apr1$BRdvH4Mu$3HrpeyBrWiS88GcSPidgq/

If you don't have htpasswd on your machine, you can use htpasswd which is a cross-platform Node implementation of htpasswd.

Public Key Auth support (ssh-only)

git-ssh-mock-server generates its own keypair using the system's native ssh-keygen the first time it's run, in order to create encrypted SSH connections. This key can be used to authenticate with the server as well!

  1. Run GIT_SSH_MOCK_SERVER_PUBKEY=true git-ssh-mock-server
  2. Try cloning (e.g. git clone ssh://localhost:2222/imaginatively-named-repo.git). It shouldn't work.
  3. Run git-ssh-mock-server exportKeys which will copy the key files to ./id_rsa and ./id_rsa.pub in the working directory with the correct file permissions (600).
  4. Run ssh-add ./id_rsa
  5. Now try cloning. It works!
  6. To clear the key from the ssh-agent, use ssh-add -d ./id_rsa

You can use GIT_SSH_MOCK_SERVER_PUBKEY and GIT_SSH_MOCK_SERVER_PASSWORD together, but using either one disables anonymous SSH access.

Dependencies

originally inspired by 'git-http-server'

License

MIT

FOSSA Status

Changelog

1.2.0 - add SSH server 1.1.0 - support running in background and CORS headers 1.0.0 - Initial release

Keywords

FAQs

Package last updated on 29 Jun 2020

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc