Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
msw-inspector
Advanced tools
Plug-and-play request assertion utility for any msw
mock setup, as highly discouraged by msw
authors :)
From msw
docs:
Instead of asserting that a request was made, or had the correct data, test how your application reacted to that request.
There are, however, some special cases where asserting on network requests is the only option. These include, for example, polling, where no other side effect can be asserted upon.
MSW inspector has you covered for these special cases.
MSW inspector provides a thin layer of logic over msw life-cycle events.
Each request is saved as a function mock call retrievable by URL. This allows elegant assertions against request information like method
, headers
, body
, query
.
This example uses Jest, but MSW inspector integrates with any testing framework.
import { createMSWInspector } from 'msw-inspector';
import { server } from '@/mocks/server';
const mswInspector = createMSWInspector({
mockSetup: server,
mockFactory: () => jest.fn(), // Provide any function mock supported by your testing library
});
beforeAll(() => {
mswInspector.setup();
});
beforeEach(() => {
mswInspector.clear();
});
afterAll(() => {
mswInspector.teardown();
});
describe('My test', () => {
it('My test', async () => {
// Perform your test preparation
expect(mswInspector.getRequests('http://my.url/path')).toHaveBeenCalledWith(
{
method: 'GET',
headers: {
'my-header': 'value',
},
body: {
'my-body': 'value',
},
query: {
'my-query': 'value',
},
}
);
});
});
createMSWInspector
Create a MSW inspector
instance bound to a specific msw
SetupServerApi or SetupWorkerApi instance:
import { createMSWInspector } from 'msw-inspector';
createMSWInspector({
mockSetup, // Any `msw` SetupServerApi or SetupWorkerApi instance
mockFactory, // Function returning a mocked function instance to be inspected in your tests
requestMapper, // Optional mapper function to customize how requests are stored
});
createMSWInspector
accepts the following options object:
{
mockSetup: SetupServerApi | SetupWorkerApi;
mockFactory: () => FunctionMock;
requestMapper?: (req: MockedRequest) => {
key: string;
record: Record<string, any>;
};
}
Option | Description | Default value |
---|---|---|
mockSetup (required) | The instance of msw mocks expected to inspect (setupWorker or setupServer result) | - |
mockFactory (required) | A function returning the function mock preferred by your testing framework: It can be () => jest.fn() for Jest, () => sinon.spy() for Sinon, () => vi.fn() for Vitest, etc... | - |
requestMapper | Customize default request's key and record mapping with your own logic. | See defaultRequestMapper |
getRequests
Returns a mocked function containing all the calls intercepted at the given absolute url (by default):
mswInspector.getRequests('http://my.url/path');
Each intercepted request calls the matching mocked function with the following default payload:
type CallPayload = {
method: string;
headers: Record<string, string>;
body?: any;
query?: Record<string, string>;
};
getRequests
@mswjs/interceptors
and make MSW inspector usable in non-msw
projects0.1.0
requestLogger
option to customize inspection resultsFAQs
Inspect requests intercepted by MSW
The npm package msw-inspector receives a total of 71 weekly downloads. As such, msw-inspector popularity was classified as not popular.
We found that msw-inspector demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.