Show HN: Hurl, test APIs with plain text and libcurl Hi, We're happy to release a new version of Hurl [1]. Hurl is a command line tool powered by curl, that runs HTTP requests defined in a simple plain text format: # Get home: GET https://example.org HTTP/1.1 200 [Captures] csrf_token: xpath "string(//meta[@name='_csrf_token']/@content)" # Do login! POST https://ift.tt/C0cJptv X-CSRF-TOKEN: HTTP/1.1 302 Hurl can be used to get data like curl, or as an integration testing tool for JSON/XML HTTP apis / HTML content. Requests can be chained, and one can add asserts on response headers, cookies and body. For instance: GET https://ift.tt/naFj7Nk screencapability: low HTTP/1.1 200 [Asserts] jsonpath "$.validated" == true jsonpath "$.userInfo.lastName" == "Herbert" jsonpath "$.hasDevice" == false jsonpath "$.links" count == 12 jsonpath "$.order" matches /^order-\d{8}$/ You can see more samples in the documentation [2]. We've designed Hurl to be easily integrated in CI/CD (GitHub, GitLab), and its text format can be used as a documentation, commited in a repo etc... It's a single binary written in Rust, that is powered by libcurl under the hood, for a fast CLI tool for both devops and developers. In this new version, we've added the following improvements: - verbose output: add more color to Hurl --verbose output, and also added --very-verbose option to output request and response bodies - request options: command-line options such as --location (follow HTTP redirection), --verbose, --insecure etc... can now be applied to a particular request with an [Options] sections - and more, see here for a quick tout of 1.7.0 [3] [1] https://ift.tt/kq2AvzZ [2] https://ift.tt/RcQHtCr [3] https://ift.tt/4cQ6wtO Previous Show HN < https://news.ycombinator.com/item?id=28758226 > and < https://news.ycombinator.com/item?id=25655737 > https://ift.tt/kq2AvzZ September 21, 2022 at 02:43PM
Show HN: Launch VM workloads securely and instantaneously, without VMs Hello HN! We've been working on a new hypervisor https://kwarantine.xyz that can run strongly isolated containers. This is still a WIP, but we wanted to give the community an idea about our approach, its benefits, and various use cases it unlocks. Today, VMs are used to host containers, and make up for the lack of strong security as well as kernel isolation in containers. This work adds this missing security piece in containers. We plan on launching a free private beta soon. Meanwhile, we'd deeply appreciate any feedback, and happy to answer any questions here or on our slack channel. Thanks! April 29, 2021 at 07:50AM
Comments