A simple HTTP server that can be used to mock HTTP responses for testing purposes. Inspired by httpbin and built using nodejs and fastify with the idea of running it via https://mockhttp.org, via docker jaredwray/mockhttp, or nodejs npm install @jaredwray/mockhttp.
- All the features of httpbin
- Taps - Inject custom responses for testing and development
- Bins - Capture and inspect incoming HTTP requests (great for webhook debugging)
@fastify/helmetbuilt in by default- Built with
nodejs,typescript, andfastify - Deploy via
dockerornodejs - Global deployment via mockhttp.org (free service)
- Better API documentation and examples
- Auto detect the port that is not in use
- Maintained and updated regularly!
- Deploy via Docker
- Deploy via Docker Compose
- Deploy via NodeJS
- HTTPS Support
- HTTP/2 Support
- Response Injection (Tap Feature)
- Request Bins
- Rate Limiting
- Logging
- Flexible URL Matching
- API Reference
- About mockhttp.org
- Contributing
- License
docker run -d -p 3000:3000 jaredwray/mockhttpservices:
mockhttp:
image: jaredwray/mockhttp:latest
ports:
- "3000:3000"If you want to run it on a different port, just change the 3000 to whatever port you want and add in the environment variable PORT to the environment.
services:
mockhttp:
image: jaredwray/mockhttp:latest
ports:
- "3001:3001"
environment:
- PORT=3001You can see an example of this in the docker-compose.yaml file.
npm install @jaredwray/mockhttp --savethen run mockhttp in your code.
import { MockHttp } from '@jaredwray/mockhttp';
const mock = new MockHttp();
await mock.start(); // start the server
const response = await fetch('http://localhost:3000/get');
console.log(response);
await mock.close(); // stop the serverMockHttp supports HTTPS with auto-generated self-signed certificates or your own custom certificates. No external dependencies are required — certificate generation uses only Node.js built-in crypto.
The simplest way to enable HTTPS is to pass https: true. A self-signed certificate for localhost is generated automatically:
import { MockHttp } from '@jaredwray/mockhttp';
const mock = new MockHttp({ https: true });
await mock.start();
console.log(mock.isHttps); // true
// Use Fastify's built-in inject() for testing (no TLS setup needed)
const response = await mock.server.inject({ method: 'GET', url: '/get' });
console.log(response.statusCode); // 200
await mock.close();Note: Self-signed certificates are not trusted by default. When making real HTTPS requests (e.g. with
fetch), setNODE_TLS_REJECT_UNAUTHORIZED=0in your test environment or use a custom HTTPS agent.
You can customize the auto-generated certificate by passing certificateOptions:
const mock = new MockHttp({
https: {
certificateOptions: {
commonName: 'my-test-server',
validityDays: 30,
keySize: 4096,
altNames: [
{ type: 'dns', value: 'example.local' },
{ type: 'dns', value: '*.example.local' },
{ type: 'ip', value: '192.168.1.100' },
],
},
},
});
await mock.start();
// Make requests...
await mock.close();You can supply your own PEM-encoded certificate and key, either as strings or file paths:
// Using PEM strings
const mock = new MockHttp({
https: {
cert: '-----BEGIN CERTIFICATE-----\n...',
key: '-----BEGIN PRIVATE KEY-----\n...',
},
});
await mock.start();
// Make requests...
await mock.close();// Using file paths
const mock = new MockHttp({
https: {
cert: '/path/to/cert.pem',
key: '/path/to/key.pem',
},
});
await mock.start();
// Make requests...
await mock.close();You can also generate certificates independently using the exported utility functions:
import { generateCertificate, generateCertificateFiles } from '@jaredwray/mockhttp';
// Generate in-memory PEM strings
const { cert, key } = generateCertificate({
commonName: 'my-app',
validityDays: 90,
});
// Generate and write to disk
const result = await generateCertificateFiles({
certPath: './certs/cert.pem',
keyPath: './certs/key.pem',
commonName: 'my-app',
});| Option | Type | Default | Description |
|---|---|---|---|
cert |
string | — | PEM-encoded certificate string or file path |
key |
string | — | PEM-encoded private key string or file path |
autoGenerate |
boolean | true |
Auto-generate a self-signed certificate when cert/key are not provided |
certificateOptions |
CertificateOptions | — | Options for the auto-generated certificate |
| Option | Type | Default | Description |
|---|---|---|---|
commonName |
string | 'localhost' |
Certificate subject Common Name (CN) |
altNames |
Array<{ type, value }> | [dns:localhost, ip:127.0.0.1, ip:::1] |
Subject Alternative Names with type 'dns' or 'ip' |
validityDays |
number | 365 |
Certificate validity period in days |
keySize |
number | 2048 |
RSA key size in bits |
MockHttp supports HTTP/2 in two modes:
- h2 — HTTP/2 over TLS (used by browsers), enabled with both
http2: trueandhttps: true - h2c — HTTP/2 cleartext (no TLS), enabled with just
http2: true, useful for service-to-service testing
import { MockHttp } from '@jaredwray/mockhttp';
const mock = new MockHttp({ http2: true, https: true });
await mock.start();
console.log(mock.http2); // true
console.log(mock.isHttps); // true
const response = await mock.server.inject({ method: 'GET', url: '/get' });
console.log(response.statusCode); // 200
await mock.close();By default, HTTP/1.1 clients can still connect via ALPN negotiation (http1 defaults to true). To disable HTTP/1.1 fallback:
const mock = new MockHttp({ http2: true, https: true, http1: false });
await mock.start();const mock = new MockHttp({ http2: true });
await mock.start();
console.log(mock.http2); // true
await mock.close();Note: Browsers do not support h2c. This mode is useful for testing gRPC or service-to-service communication.
HTTP2=true node your-app.jsThe injection/tap feature allows you to "tap into" the request flow and inject custom responses for specific requests. This is particularly useful for:
- Offline testing - Mock external API responses without network access
- Testing edge cases - Simulate errors, timeouts, or specific response scenarios
- Development - Work on your application without depending on external services
A "tap" is a reference to an injected response, similar to "wiretapping" - you're intercepting requests and returning predefined responses. Each tap can be removed when you're done with it, restoring normal server behavior.
import { mockhttp } from '@jaredwray/mockhttp';
const mock = new mockhttp();
await mock.start();
// Inject a simple response
const tap = mock.taps.inject(
{
response: "Hello, World!",
statusCode: 200,
headers: { "Content-Type": "text/plain" }
},
{
url: "/api/greeting",
method: "GET"
}
);
// Make requests - they will get the injected response
const response = await fetch('http://localhost:3000/api/greeting');
console.log(await response.text()); // "Hello, World!"
// Remove the injection when done
mock.taps.removeInjection(tap);
await mock.close();const tap = mock.taps.inject(
{
response: { message: "Success", data: { id: 123 } },
statusCode: 200
},
{ url: "/api/users/123" }
);// Match all requests under /api/
const tap = mock.taps.inject(
{
response: "API is mocked",
statusCode: 503
},
{ url: "/api/*" }
);const tap1 = mock.taps.inject(
{ response: "Users data" },
{ url: "/api/users" }
);
const tap2 = mock.taps.inject(
{ response: "Posts data" },
{ url: "/api/posts" }
);
// View all active injections
console.log(mock.taps.injections); // Map of all active taps
// Remove specific injections
mock.taps.removeInjection(tap1);
mock.taps.removeInjection(tap2);// Only intercept POST requests
const tap = mock.taps.inject(
{ response: "Created", statusCode: 201 },
{ url: "/api/users", method: "POST" }
);const tap = mock.taps.inject(
{ response: "Authenticated response" },
{
url: "/api/secure",
headers: {
"authorization": "Bearer token123"
}
}
);// Match ALL requests (no matcher specified)
const tap = mock.taps.inject({
response: "Server is in maintenance mode",
statusCode: 503
});You can provide a function that dynamically generates the response based on the incoming request:
// Function response with access to the request object
const tap = mock.taps.inject(
(request) => {
return {
response: {
message: `You requested ${request.url}`,
method: request.method,
timestamp: new Date().toISOString()
},
statusCode: 200,
headers: {
"X-Request-Path": request.url
}
};
},
{ url: "/api/*" }
);// Conditional responses based on request
const tap = mock.taps.inject((request) => {
// Return error for URLs containing 'error'
if (request.url.includes('error')) {
return {
response: { error: "Something went wrong" },
statusCode: 500
};
}
// Return success for everything else
return {
response: { status: "success" },
statusCode: 200
};
});// Dynamic headers based on request
const tap = mock.taps.inject(
(request) => ({
response: "OK",
statusCode: 200,
headers: {
"X-Original-Method": request.method,
"X-Original-URL": request.url,
"X-Original-Host": request.hostname
}
}),
{ url: "/api/mirror" }
);Bins are ephemeral URL endpoints that capture incoming HTTP requests so you can inspect them later. They're the inverse of Taps: instead of injecting a response, they record everything they receive. Useful for:
- Debugging webhooks — point Stripe / GitHub / Slack at a bin URL and see exactly what they send
- Exercising client SDKs — verify your SDK sends the request shape you expect
- Recording fixtures — capture real traffic to replay in tests later
There are two URL prefixes:
/bins— JSON management API: create, list, inspect, delete bins/b/:id— the capture URL. Any HTTP method, any sub-path, any body sent here is stored against bin:id
# 1. create a bin
curl -s -X POST http://localhost:3000/bins
# → { "id": "abc123def456", "url": "http://localhost:3000/b/abc123def456",
# "createdAt": "2026-05-18T12:00:00.000Z",
# "expiresAt": "2026-05-19T12:00:00.000Z",
# "requestCount": 0 }
# 2. send anything to the capture URL
curl -X POST "http://localhost:3000/b/abc123def456/webhook?source=stripe" \
-H 'content-type: application/json' \
-d '{"event":"payment.succeeded"}'
# → { "ok": true, "binId": "abc123def456", "requestId": "f9c2e1a40b3d" }
# 3. list captured requests (newest first)
curl http://localhost:3000/bins/abc123def456/requests| Method | Path | Description |
|---|---|---|
| POST | /bins |
Create a new bin |
| GET | /bins |
List all active bins |
| GET | /bins/:id |
Get bin metadata |
| GET | /bins/:id/requests |
List captured requests (newest first) |
| GET | /bins/:id/requests/:reqId |
Get a single captured request |
| DELETE | /bins/:id/requests |
Clear all captured requests in a bin |
| DELETE | /bins/:id |
Delete a bin |
| ANY | /b/:id and /b/:id/* |
Capture requests sent to a bin |
A complete walkthrough using curl:
BASE=http://localhost:3000
# Create the bin and grab its id
ID=$(curl -s -X POST $BASE/bins | jq -r .id)
echo "Bin URL: $BASE/b/$ID"
# Simulate a Stripe webhook
curl -s -X POST "$BASE/b/$ID/stripe/events?secret=whsec_test" \
-H 'content-type: application/json' \
-H 'stripe-signature: t=1700000000,v1=abc123' \
-d '{"id":"evt_1","type":"payment_intent.succeeded","data":{"object":{"amount":2000}}}'
# Simulate a GitHub webhook
curl -s -X POST "$BASE/b/$ID/github" \
-H 'content-type: application/json' \
-H 'x-github-event: pull_request' \
-d '{"action":"opened","number":42}'
# Inspect everything that arrived
curl -s "$BASE/bins/$ID/requests" | jq
# Drill into the most recent one
RID=$(curl -s "$BASE/bins/$ID/requests" | jq -r '.requests[0].id')
curl -s "$BASE/bins/$ID/requests/$RID" | jq
# {
# "id": "f9c2e1a40b3d",
# "binId": "abc123def456",
# "method": "POST",
# "url": "/github",
# "path": "/github",
# "query": {},
# "headers": {
# "host": "localhost:3000",
# "content-type": "application/json",
# "x-github-event": "pull_request"
# },
# "remoteAddress": "127.0.0.1",
# "contentType": "application/json",
# "bodySize": 32,
# "body": "{\"action\":\"opened\",\"number\":42}",
# "bodyEncoding": "utf8",
# "truncated": false,
# "capturedAt": "2026-05-18T12:00:01.234Z"
# }
# Clean up
curl -s -X DELETE "$BASE/bins/$ID/requests" # clear captures, keep the bin
curl -s -X DELETE "$BASE/bins/$ID" # delete the bin entirely{
"id": "f9c2e1a40b3d",
"binId": "abc123def456",
"method": "POST",
"url": "/webhook?source=stripe",
"path": "/webhook",
"query": { "source": "stripe" },
"headers": { "content-type": "application/json", "...": "..." },
"remoteAddress": "127.0.0.1",
"contentType": "application/json",
"bodySize": 32,
"body": "{\"event\":\"payment.succeeded\"}",
"bodyEncoding": "utf8",
"truncated": false,
"capturedAt": "2026-05-18T12:00:00.000Z"
}urlis the request URL relative to the bin (everything after/b/:id).pathis the sub-path only, without the query string.bodyEncodingis"utf8"for text content types (text/*, application/json, application/xml, application/x-www-form-urlencoded, application/javascript),"base64"for everything else (binary payloads), or"none"when no body was sent.truncatedistruewhen the body exceededmaxBodySizeand was cut off.bodySizereflects the original length.
JSON, XML, form-encoded, plain text, and JavaScript are stored as UTF-8 strings so you can read them directly:
curl -X POST "http://localhost:3000/b/$ID" \
-H 'content-type: application/json' \
-d '{"hello":"world"}'
curl -s "http://localhost:3000/bins/$ID/requests" | jq '.requests[0] | {bodyEncoding, body}'
# {
# "bodyEncoding": "utf8",
# "body": "{\"hello\":\"world\"}"
# }Any non-text content type is base64-encoded, preserving the bytes exactly:
# Upload a PNG to the bin
curl -X POST "http://localhost:3000/b/$ID/upload" \
-H 'content-type: image/png' \
--data-binary @logo.png
curl -s "http://localhost:3000/bins/$ID/requests" | jq '.requests[0] | {bodyEncoding, bodySize}'
# {
# "bodyEncoding": "base64",
# "bodySize": 14823
# }
# Decode the body back to bytes
curl -s "http://localhost:3000/bins/$ID/requests" \
| jq -r '.requests[0].body' | base64 -d > recovered.pngBodies larger than maxBodySize (1 MiB by default) are cut off and flagged:
// In test setup
import { MockHttp, BinManager } from '@jaredwray/mockhttp';
const mock = new MockHttp();
mock.bins = new BinManager({ maxBodySize: 1024 }); // 1 KiB cap
await mock.start();# Send 5000 bytes to a bin with a 1 KiB cap
head -c 5000 /dev/urandom | curl -X POST "http://localhost:3000/b/$ID" \
-H 'content-type: application/octet-stream' \
--data-binary @-
curl -s "http://localhost:3000/bins/$ID/requests" | jq '.requests[0] | {bodySize, truncated, body_len: (.body | length)}'
# {
# "bodySize": 5000, ← original size
# "truncated": true,
# "body_len": 1368 ← base64 of the first 1024 bytes
# }Once a bin reaches maxRequestsPerBin captures (100 by default), the oldest
ones are dropped:
# Send 105 requests
for i in $(seq 1 105); do
curl -s -X POST "http://localhost:3000/b/$ID/event/$i" > /dev/null
done
# The bin holds the most recent 100; the first 5 are gone
curl -s "http://localhost:3000/bins/$ID/requests" | jq '.requests | length'
# 100
# Newest is at the top
curl -s "http://localhost:3000/bins/$ID/requests" | jq '.requests[0].path'
# "/event/105"The bin manager is exposed on the MockHttp instance as mock.bins. This
makes it easy to drive bins from a test suite without going through HTTP:
import { MockHttp } from '@jaredwray/mockhttp';
const mock = new MockHttp({ logging: false });
await mock.start();
// Create a bin
const bin = mock.bins.createBin();
console.log(`Webhook target: http://localhost:${mock.port}/b/${bin.id}`);
// ... point your code-under-test at that URL ...
// Read captured requests (newest first)
const requests = mock.bins.getRequests(bin.id);
console.log(`Captured ${requests.length} requests`);
for (const req of requests) {
console.log(`${req.method} ${req.path} (${req.bodySize} bytes)`);
}
// Clean up
mock.bins.deleteBin(bin.id);
await mock.close(); // also stops the bin cleanup timerimport { afterAll, beforeAll, expect, test } from 'vitest';
import { MockHttp } from '@jaredwray/mockhttp';
let mock: MockHttp;
beforeAll(async () => {
mock = new MockHttp({ logging: false });
await mock.start();
});
afterAll(async () => {
await mock.close();
});
test('my SDK sends the right webhook payload', async () => {
const bin = mock.bins.createBin();
const webhookUrl = `http://localhost:${mock.port}/b/${bin.id}`;
// Drive your SDK at the bin
await mySdk.notify(webhookUrl, { event: 'user.created', id: 42 });
// Assert on what actually arrived
const [captured] = mock.bins.getRequests(bin.id);
expect(captured.method).toBe('POST');
expect(captured.contentType).toBe('application/json');
expect(JSON.parse(captured.body!)).toEqual({
event: 'user.created',
id: 42,
});
expect(captured.headers['x-signature']).toBeDefined();
});Bins are enabled by default. To disable the routes entirely:
const mock = new MockHttp({
httpBin: { bins: false },
});To tune limits, replace the default BinManager before starting:
import { MockHttp, BinManager } from '@jaredwray/mockhttp';
const mock = new MockHttp();
mock.bins = new BinManager({
defaultTtlMs: 60 * 60 * 1000, // 1 hour (default: 24h)
maxRequestsPerBin: 500, // (default: 100)
maxBodySize: 5 * 1024 * 1024, // 5 MiB (default: 1 MiB)
idLength: 16, // (default: 12)
cleanupIntervalMs: 30 * 1000, // sweep every 30s (default: 60s)
});
await mock.start();| Option | Default | Description |
|---|---|---|
defaultTtlMs |
86400000 (24h) |
Bin lifetime. Expired bins return 404 and are lazily removed. |
maxRequestsPerBin |
100 |
When exceeded, oldest captures are dropped (FIFO). |
maxBodySize |
1048576 (1 MiB) |
Larger bodies are truncated; truncated: true is set on the capture. |
idLength |
12 |
Length of generated bin and request ids. |
cleanupIntervalMs |
60000 (1 min) |
How often expired bins are swept. The timer is unref()'d so it never keeps the process alive. |
BinManager accepts a store: BinStore so you can plug in alternative
backends (Redis, SQLite, etc.) without changing the rest of the codebase. The
default InMemoryBinStore keeps state in process memory.
import {
BinManager,
InMemoryBinStore,
type Bin,
type BinStore,
type CapturedRequest,
} from '@jaredwray/mockhttp';
class RedisBinStore implements BinStore {
createBin(bin: Bin): void { /* SET bin:${bin.id} ... */ }
getBin(id: string): Bin | undefined { /* GET ... */ }
listBins(): Bin[] { /* SCAN ... */ }
deleteBin(id: string): boolean { /* DEL ... */ }
addRequest(binId: string, req: CapturedRequest, max: number): void {
/* LPUSH bin:${binId}:requests + LTRIM to max */
}
getRequests(binId: string): CapturedRequest[] { /* LRANGE ... */ }
getRequest(binId: string, reqId: string): CapturedRequest | undefined { /* ... */ }
clearRequests(binId: string): void { /* DEL bin:${binId}:requests */ }
cleanupExpired(now: number): string[] { /* scan + delete */ return []; }
}
mock.bins = new BinManager({ store: new RedisBinStore() });MockHttp supports rate limiting using @fastify/rate-limit. Rate limiting is enabled by default at 1000 requests per minute with localhost (127.0.0.1 and ::1) excluded from rate limiting.
By default, MockHttp applies the following rate limit:
- 1000 requests per minute per IP address
- Localhost is excluded - requests from 127.0.0.1 and ::1 bypass rate limiting (ideal for local development and testing)
import { MockHttp } from '@jaredwray/mockhttp';
const mock = new MockHttp();
await mock.start();
// Rate limiting is active (1000 req/min) except for localhostTo customize rate limiting, pass a rateLimit configuration object when creating your MockHttp instance:
import { MockHttp } from '@jaredwray/mockhttp';
const mock = new MockHttp({
rateLimit: {
max: 100, // Maximum 100 requests
timeWindow: '1 minute' // Per 1 minute window
}
});
await mock.start();The rateLimit option accepts all @fastify/rate-limit options:
// Limit to 50 requests per minute
const mock = new MockHttp({
rateLimit: {
max: 50,
timeWindow: '1 minute'
}
});const mock = new MockHttp({
rateLimit: {
max: 30,
timeWindow: 60000, // 1 minute in milliseconds
errorResponseBuilder: (req, context) => ({
statusCode: 429,
error: 'Too Many Requests',
message: `Rate limit exceeded. Try again in ${context.after}`
})
}
});const mock = new MockHttp({
rateLimit: {
max: 100,
timeWindow: '1 minute',
allowList: ['127.0.0.1', '192.168.1.100'] // These IPs bypass rate limiting
}
});const mock = new MockHttp({
rateLimit: {
max: 100,
timeWindow: '1 minute',
keyGenerator: (request) => {
// Rate limit by API key instead of IP
return request.headers['x-api-key'] || request.ip;
}
}
});const mock = new MockHttp({
rateLimit: {
global: true, // Apply to all routes
max: 100, // Max requests
timeWindow: '1 minute', // Time window
cache: 10000, // Cache size for tracking clients
skipOnError: false, // Don't skip on storage errors
ban: 10, // Ban after 10 rate limit violations
continueExceeding: false, // Don't reset window on each request
enableDraftSpec: true, // Use IETF draft spec headers
addHeaders: { // Customize rate limit headers
'x-ratelimit-limit': true,
'x-ratelimit-remaining': true,
'x-ratelimit-reset': true
}
}
});To disable rate limiting completely, set the rateLimit option to false:
const mock = new MockHttp({
rateLimit: false // Completely disable rate limiting
});
await mock.start();
// No rate limiting is applied to any requestsNote: To change rate limiting settings after the server has started, you must restart the server:
const mock = new MockHttp();
await mock.start(); // Starts with default rate limiting
// To change or disable rate limiting:
await mock.close();
mock.rateLimit = undefined; // or set new options
await mock.start(); // Restarts with new settings| Option | Type | Default | Description |
|---|---|---|---|
max |
number | function | 1000 |
Maximum requests per time window |
timeWindow |
number | string | 60000 |
Duration of rate limit window (milliseconds or string like '1 minute') |
cache |
number | 5000 |
LRU cache size for tracking clients |
allowList |
array | function | [] |
IPs or function to exclude from rate limiting |
keyGenerator |
function | IP-based | Function to generate unique client identifier |
errorResponseBuilder |
function | Default 429 | Custom error response function |
skipOnError |
boolean | false |
Skip rate limiting if storage errors occur |
ban |
number | -1 |
Ban client after N violations (disabled by default) |
continueExceeding |
boolean | false |
Renew time window on each request while limited |
enableDraftSpec |
boolean | false |
Use IETF draft specification headers |
For the complete list of options, see the @fastify/rate-limit documentation.
MockHttp uses Pino for logging via Fastify's built-in logger. Logging is enabled by default but can be disabled when needed.
import { MockHttp } from '@jaredwray/mockhttp';
const mock = new MockHttp({ logging: false });
await mock.start();
// Server runs silently without any log outputYou can also disable logging via the LOGGING environment variable:
LOGGING=false node your-app.jsMockHttp ignores trailing path segments that come after the parsable portion of a URL. This is useful when a client appends extra data to a known endpoint — instead of returning 404, MockHttp serves the closest matching route.
For example, all of these are served by /status/:code:
GET /status/429
GET /status/429/
GET /status/429/foo
GET /status/429/foo/bar
The rewrite preserves the query string and only triggers when a more specific route exists; URLs whose first path segment doesn't correspond to a registered route still return 404.
new MockHttp(options?)Parameters:
options?(MockHttpOptions):port?: number - The port to listen on (default: 3000)host?: string - The host to listen on (default: '0.0.0.0')autoDetectPort?: boolean - Auto-detect next available port if in use (default: true)helmet?: boolean - Use Helmet for security headers (default: true)apiDocs?: boolean - Enable Swagger API documentation (default: true)rateLimit?: RateLimitPluginOptions - Configure rate limiting (default: 1000 req/min, localhost excluded)logging?: boolean - Enable logging (default: true)httpBin?: HttpBinOptions - Configure which httpbin routes to enablehttpMethods?: boolean - Enable HTTP method routes (default: true)redirects?: boolean - Enable redirect routes (default: true)requestInspection?: boolean - Enable request inspection routes (default: true)responseInspection?: boolean - Enable response inspection routes (default: true)statusCodes?: boolean - Enable status code routes (default: true)responseFormats?: boolean - Enable response format routes (default: true)cookies?: boolean - Enable cookie routes (default: true)anything?: boolean - Enable anything routes (default: true)auth?: boolean - Enable authentication routes (default: true)images?: boolean - Enable image routes (default: true)bins?: boolean - Enable request bin routes /bins and /b/:id (default: true)
https?: boolean | HttpsOptions - Enable HTTPS with auto-generated or custom certificates (default: undefined/disabled)http2?: boolean - Enable HTTP/2 support (default: false)http1?: boolean - Allow HTTP/1.1 fallback when using HTTP/2 with HTTPS (default: true)hookOptions?: HookifiedOptions - Hookified options
port: number - Get/set the server porthost: string - Get/set the server hostautoDetectPort: boolean - Get/set auto-detect port behaviorhelmet: boolean - Get/set Helmet security headersapiDocs: boolean - Get/set API documentationlogging: boolean - Get/set logging enabled staterateLimit: RateLimitPluginOptions | undefined - Get/set rate limiting optionshttpBin: HttpBinOptions - Get/set httpbin route optionshttps: HttpsOptions | undefined - Get/set HTTPS configurationisHttps: boolean - Whether the server is running with HTTPShttp2: boolean - Get/set HTTP/2 supporthttp1: boolean - Get/set HTTP/1.1 fallback for HTTP/2 with HTTPSserver: FastifyInstance - Get/set the Fastify server instancetaps: TapManager - Get/set the TapManager instancebins: BinManager - Get/set the BinManager instance for request bins
Start the Fastify server. If already running, it will be closed and restarted.
Stop the Fastify server.
Detect the next available port.
Returns: number - The available port
Register Swagger API documentation routes.
Register HTTP method routes (GET, POST, PUT, PATCH, DELETE).
Register status code routes.
Register request inspection routes (headers, ip, user-agent).
Register response inspection routes (cache, etag, response-headers).
Register response format routes (json, xml, html, etc.).
Register redirect routes (absolute, relative, redirect-to).
Register cookie routes (get, set, delete).
Register "anything" catch-all routes.
Register authentication routes (basic, bearer, digest, hidden-basic).
Register image routes (jpeg, png, svg, webp) with content negotiation support.
Register the request bin routes — management at /bins and capture at /b/:id.
Access the BinManager via mockHttp.bins to manage request bins programmatically. See Request Bins for usage examples.
Create a new bin with the configured TTL.
Returns: Bin — { id, createdAt, expiresAt, requestCount }
Look up a bin by id. Returns undefined if the bin does not exist or has expired (and lazily removes the expired entry).
Returns: Bin | undefined
List all non-expired bins.
Returns: Bin[]
Delete a bin and all its captured requests.
Returns: boolean — true if the bin existed
List captured requests for a bin, newest first.
Returns: CapturedRequest[]
Look up a single captured request.
Returns: CapturedRequest | undefined
Clear all captured requests in a bin (the bin itself is preserved).
Manually record a captured request. Returns undefined if the bin does not exist or is expired. Normally invoked by the capture route, but available for programmatic use.
Returns: CapturedRequest | undefined
Start or stop the periodic cleanup of expired bins. MockHttp.start() and MockHttp.close() call these automatically. The interval is unref()'d so it never keeps the Node process alive.
Read-only getters for the currently-configured limits.
Access the TapManager via mockHttp.taps to inject custom responses.
Injects a custom response for requests matching the criteria.
Parameters:
-
response(InjectionResponse | InjectionResponseFunction):- Static Response (InjectionResponse):
response: string | object | Buffer - The response bodystatusCode?: number - HTTP status code (default: 200)headers?: object - Response headers
- Function Response (InjectionResponseFunction):
- A function that receives the Fastify request object and returns an InjectionResponse
(request: FastifyRequest) => InjectionResponse- Allows dynamic response generation based on request properties (url, method, headers, etc.)
- Static Response (InjectionResponse):
-
matcher?(InjectionMatcher) - Optional matching criteria:url?: string - URL path (supports wildcards with*)method?: string - HTTP method (GET, POST, etc.)hostname?: string - Hostname to matchheaders?: object - Headers that must be present
Returns: InjectionTap - A tap object with a unique id that can be used to remove the injection
Removes an injection.
Parameters:
tapOrId: InjectionTap | string - The tap object or tap ID to remove
Returns: boolean - true if removed, false if not found
A getter that returns a Map of all active injection taps.
Returns: Map<string, InjectionTap> - Map of all active injections with tap IDs as keys
Removes all injections.
A getter that returns whether there are any active injections.
Returns: boolean - true if there are active injections, false otherwise
mockhttp.org is a free service that runs this codebase and allows you to use it for testing purposes. It is a simple way to mock HTTP responses for testing purposes. It is globally available has some limitations on it to prevent abuse such as requests per second. It is ran via Cloudflare and Google Cloud Run across 7 regions globally and can do millions of requests per second.
Please read our CODE OF CONDUCT and CONTRIBUTING for details on our code of conduct, and the process for submitting pull requests to us.