Skip to content

Commit 35b5578

Browse files
committed
Update rss feed.
1 parent a65da82 commit 35b5578

2 files changed

Lines changed: 8 additions & 12 deletions

File tree

sites/hurl.dev/_posts/2025-03-14-announcing-hurl-6.1.0.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ To run this file, traditionally we set the variable value with an environment va
6666
$ hurl --variable password=$PASSWORD foo.hurl
6767
```
6868

69-
But, if we run this file with [`--verbose`] option, we can accidentally leak the value of the secret header:
69+
But, if we run this file with [`--verbose`]({% link _docs/manual.md %}#verbose) option, we can accidentally leak the value of the secret header:
7070

7171
```shell
7272
$ hurl --verbose foo.hurl
@@ -123,7 +123,7 @@ error: Assert status code
123123
|
124124
```
125125
126-
Started with Hurl 6.1.0, you can inject a variable whose value will be redacted from any logs using [`--secret` option]:
126+
Started with Hurl 6.1.0, you can inject a variable whose value will be redacted from any logs using [`--secret` option]({%link _docs/templates.md %}#secrets):
127127
128128
```
129129
$ hurl --secret password=$PASSWORD foo.hurl
@@ -147,7 +147,7 @@ But secrets in Hurl are also redacted from the reports ([HTML], [JSON], [JUnit]
147147
as artifacts of your CI/CD pipelines.
148148
149149
Finally, sometimes you don't know a secret value beforehand, or the secret value is not static. In that case, the keyword
150-
[`redact` combined with captures] allows you to extract data from HTTP responses and redact it through the run:
150+
[`redact` combined with captures]({% link _docs/capturing-response.md %}#redacting-secrets) allows you to extract data from HTTP responses and redact it through the run:
151151
152152
```hurl
153153
GET http://bar.com/api/get-token
@@ -280,7 +280,7 @@ location: true
280280
HTTP 200
281281
```
282282
283-
With this new version, we have added [`--header`] option, that will add a specific HTTP header to all requests of a run:
283+
With this new version, we have added [`--header`]({% link _docs/manual.md %}#header) option, that will add a specific HTTP header to all requests of a run:
284284
285285
```shell
286286
$ hurl --header 'x-header-b:baz' --header 'x-header-c:qux' foo.hurl
@@ -300,19 +300,15 @@ We'll be happy to hear from you, either for enhancement requests or for sharing
300300
[Hurl]: https://hurl.dev
301301
[curl]: https://curl.se
302302
[to use a variable]: {% link _docs/templates.md %}#injecting-variables
303-
[`--verbose`]: {% link _docs/manual.md %}#verbose
304-
[`--secret` option]: {% link _docs/templates.md %}#secrets
305303
[GitHub Actions]: https://github.com/features/actions
306304
[GitLab CI/CD]: https://docs.gitlab.com/ci/
307-
[`redact` combined with captures]: {% link _docs/capturing-response.md %}#redacting-secrets
308305
[to capture]: {% link _docs/capturing-response.md %}
309306
[assert data]: {% link _docs/asserting-response.md %}
310307
[libcurl HTTP engine]: https://curl.se/libcurl/
311308
[IP address query]: {% link _docs/asserting-response.md %}#ip-address-assert
312309
[use IPv6 addresses]: {% link _docs/manual.md %}#ipv6
313310
[HTTP version]: {% link _docs/asserting-response.md %}#version-status
314311
[filters]: {% link _docs/filters.md %}
315-
[`--header`]: {% link _docs/manual.md %}#header
316312
[HTML]: {% link _docs/running-tests.md %}#html-report
317313
[JSON]: {% link _docs/running-tests.md %}#json-report
318314
[JUnit]: {% link _docs/running-tests.md %}#junit-report

sites/hurl.dev/_posts/feed.xml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ HTTP 200
5555
<p>To run this file, traditionally we set the variable value with an environment variable: </p>
5656
<pre><code class="language-shell">$ hurl --variable password=$PASSWORD foo.hurl
5757
</code></pre>
58-
<p>But, if we run this file with [<code>--verbose</code>] option, we can accidentally leak the value of the secret header:</p>
58+
<p>But, if we run this file with <a href="https://hurl.dev/docs/manual.html#verbose"><code>--verbose</code></a> option, we can accidentally leak the value of the secret header:</p>
5959
<pre><code class="language-shell">$ hurl --verbose foo.hurl
6060
* ------------------------------------------------------------------------------
6161
* Executing entry 1
@@ -106,7 +106,7 @@ error: Assert status code
106106
| ^^^ actual value is &lt;200&gt;
107107
|
108108
</code></pre>
109-
<p>Started with Hurl 6.1.0, you can inject a variable whose value will be redacted from any logs using [<code>--secret</code> option]:</p>
109+
<p>Started with Hurl 6.1.0, you can inject a variable whose value will be redacted from any logs using <a href="{%link _docs/templates.md %}#secrets"><code>--secret</code> option</a>:</p>
110110
<pre><code>$ hurl --secret password=$PASSWORD foo.hurl
111111
</code></pre>
112112
<p>You can use <code>--secret</code> also to hide values even if these variables are not used in a Hurl file. This way, you can also protect
@@ -123,7 +123,7 @@ $ hurl --secret password=$PASSWORD \
123123
But secrets in Hurl are also redacted from the reports (<a href="https://hurl.dev/docs/running-tests.html#html-report">HTML</a>, <a href="https://hurl.dev/docs/running-tests.html#json-report">JSON</a>, <a href="https://hurl.dev/docs/running-tests.html#junit-report">JUnit</a> etc...) so you can safely store these reports
124124
as artifacts of your CI/CD pipelines.</p>
125125
<p>Finally, sometimes you don’t know a secret value beforehand, or the secret value is not static. In that case, the keyword
126-
[<code>redact</code> combined with captures] allows you to extract data from HTTP responses and redact it through the run:</p>
126+
<a href="https://hurl.dev/docs/capturing-response.html#redacting-secrets"><code>redact</code> combined with captures</a> allows you to extract data from HTTP responses and redact it through the run:</p>
127127
<pre><code class="language-hurl">GET http://bar.com/api/get-token
128128
HTTP 200
129129
[Captures]
@@ -223,7 +223,7 @@ status toString matches /(200|204)/
223223
location: true
224224
HTTP 200
225225
</code></pre>
226-
<p>With this new version, we have added [<code>--header</code>] option, that will add a specific HTTP header to all requests of a run: </p>
226+
<p>With this new version, we have added <a href="https://hurl.dev/docs/manual.html#header"><code>--header</code></a> option, that will add a specific HTTP header to all requests of a run: </p>
227227
<pre><code class="language-shell">$ hurl --header 'x-header-b:baz' --header 'x-header-c:qux' foo.hurl
228228
</code></pre>
229229
<p><strong>That’s all for today!</strong></p>

0 commit comments

Comments
 (0)