Go to file
2012-06-20 10:59:38 +12:00
libpathod Re-enable SSL service. 2012-06-20 10:59:38 +12:00
test Porting to netlib proceeds apace. 2012-06-19 13:23:07 +12:00
.coveragerc Port test suite over to Nose. 2012-06-09 15:08:51 +12:00
.gitignore Porting to netlib proceeds apace. 2012-06-19 13:23:07 +12:00
LICENSE setup.py, LICENSE, README.txt 2012-04-29 21:30:48 +12:00
opathod Start refactoring towards netlib, adding SNI and client testing. 2012-06-17 07:57:24 +12:00
pathod Start porting web app to Flask. 2012-06-19 16:57:57 +12:00
README.mkd Fix redundant imports, tweak TODO for 0.2 2012-04-30 10:09:16 +12:00
README.txt Docs, installation instructions. 2012-04-29 22:08:35 +12:00
setup.py Add requests to install_requires. 2012-06-07 17:03:16 +12:00
todo Fix redundant imports, tweak TODO for 0.2 2012-04-30 10:09:16 +12:00

**pathod** is a pathological HTTP/S daemon, useful for testing and torturing
HTTP clients. At **pathod**'s heart is a tiny, terse language for crafting HTTP
responses. The simplest way to use **pathod** is to fire up the daemon, and
specify the response behaviour you want using this language in the request URL.
Here's a minimal example:

    http://localhost:9999/p/200

Everything after the "/p/" path component is a response specifier - in this
case just a vanilla 200 OK response. See the complete docs to get (much)
fancier. You can also add anchors to the **pathod** server that serve a fixed
response whenever a matching URL is requested:

    pathod --anchor "/foo=200"

Here, "/foo" a regex specifying the anchor path, and the part after the "=" is
a response specifier.

**pathod** also has a nifty built-in web interface, which lets you play with
the language by previewing responses, exposes activity logs, online help and
various other goodies. Try it by visiting the server root:

    http://localhost:9999