aboutsummaryrefslogtreecommitdiffstats
path: root/libpathod/templates/docs_pathod.html
blob: 21e7919a5bd75005974fbdc67c7b6cc94e47b7a2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
{% extends "docframe.html" %} {% block body %}
<div class="page-header">
    <h1>
        pathod
        <small>A pathological web daemon.</small>
    </h1>
</div>

<p>
    Pathod is a pathological HTTP daemon designed to let you craft almost any conceivable
    HTTP response, including ones that creatively violate the standards. HTTP responses
    are specified using a
    <a href="/docs/language">small, terse language</a>, which pathod shares with its evil
    twin <a href="/docs/pathoc">pathoc</a>.
</p>

<section>
    <div class="page-header">
        <h1>Getting started</h1>
    </div>

    <p>To start playing with pathod, simply fire up the daemon:</p>

    <pre class="terminal">./pathod</pre>

    <p>
        By default, the service listens on port 9999 of localhost. Pathod's documentation is self-hosting,
        and the pathod daemon exposes an interface that lets you play with the specifciation
        language, preview what responses and requests would look like on the wire, and
        view internal logs. To access all of this, just fire up your browser, and point
        it to the following URL:
    </p>

    <pre class="example">http://localhost:9999</pre>

    <p>
        The default crafting anchor point is the path <b>/p/</b>. Anything after this
        URL prefix is treated as a response specifier. So, hitting the following URL will
        generate an HTTP 200 response with 100 bytes of random data:
    </p>

    <pre class="example">http://localhost:9999/p/200:b@100</pre>

    <p>
        See the <a href="/docs/language">language documentation</a> to get (much) fancier.
        The pathod daemon also takes a range of configuration options. To view those,
        use the command-line help:
    </p>

    <pre class="terminal">./pathod --help</pre>

</section>

<section>
    <div class="page-header">
        <h1>Acting as a proxy</h1>
    </div>

    <p>
        Pathod automatically responds to both straight HTTP and proxy requests. For proxy requests,
        the upstream host is ignored, and the path portion of the URL is used to match
        anchors. This lets you test software that supports a proxy configuration by spoofing
        responses from upstream servers.
    </p>

    <p>
        By default, we treat all proxy CONNECT requests as HTTPS traffic, serving the response
        using either pathod's built-in certificates, or the cert/key pair specified by
        the user. You can over-ride this behaviour if you're testing a client that makes
        a non-SSL CONNECT request using the -C command-line option.
    </p>
</section>


<section>
    <div class="page-header">
        <h1>Anchors</h1>
    </div>

    <p>
        Anchors provide an alternative to specifying the response in the URL. Instead, you attach
        a response to a pre-configured anchor point, specified with a regex. When a URL
        matching the regex is requested, the specified response is served.
    </p>

    <pre class="terminal">./pathod -a "/foo=200"</pre>

    <p>
        Here, "/foo" is the regex specifying the anchor path, and the part after the "=" is a
        response specifier.
    </p>
</section>


<section>
    <div class="page-header">
        <h1>File Access</h1>
    </div>

    <p>
        There are two operators in the <a href="/docs/language">language</a> that load
        contents from file - the <b>+</b> operator to load an entire request specification
        from file, and the <b>&gt;</b> value specifier. In pathod, both of these operators
        are restricted to a directory specified at startup, or disabled if no directory
        is specified:</p>
    <pre class="terminal">./pathod -d ~/staticdir"</pre>
</section>


<section>
    <div class="page-header">
        <h1>Internal Error Responses</h1>
    </div>

    <p>
        Pathod uses the non-standard 800 response code to indicate internal errors, to distinguish
        them from crafted responses. For example, a request to:
    </p>

    <pre class="example">http://localhost:9999/p/foo</pre>

    <p>
        ... will return an 800 response because "foo" is not a valid page specifier.
    </p>
</section>


<section>
    <div class="page-header">
        <h1>API</h1>
    </div>

    <p>
        pathod exposes a simple API, intended to make it possible to drive and inspect the daemon
        remotely for use in unit testing and the like.
    </p>

    <table class="table table-bordered">
        <tbody>
            <tr>
                <td>
                    /api/clear_log
                </td>
                <td>
                    A POST to this URL clears the log buffer.
                </td>
            </tr>
            <tr>
                <td>
                    /api/info
                </td>
                <td>
                    Basic version and configuration info.
                </td>
            </tr>
            <tr>
                <td>
                    /api/log
                </td>
                <td>
                    Returns the current log buffer. At the moment the buffer size is 500 entries - when the
                    log grows larger than this, older entries are discarded. The returned
                    data is a JSON dictionary, with the form:

                    <pre>{ 'log': [ ENTRIES ] } </pre>

                    You can preview the JSON data returned for a log entry through the built-in web interface.
                </td>
            </tr>
        </tbody>
    </table>
</section>
{% endblock %}