blob: 3c1ba8ff294f030981f94bf7ed8701fbec0fdbde (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
|
{% extends "frame.html" %}
{% block body %}
<div class="row">
<div class="span6 bigtitle">
<div>
<img src="/static/torture.png">
</div>
</div>
<div class="span6 bigtitle">
<div>Tormenting HTTP clients and servers</div>
</div>
</div>
<div class="row">
<div class="span6">
<div>
<h1> <a href="/docs/pathod">pathod</a> </h1>
<p>A pathological web daemon.</p>
{% include "response_previewform.html" %}
<br>
<p>There is also a live, public instance of pathod here:</p>
<p><b>http://public.pathod.net/</b><input
style="width: 14em"
id="publicspec"
name="spec"
class="input-medium search-query"
value="{{spec}}"
placeholder="code[msg]:[features]"
>
<a id="gopublic" class="btn">go</a>
</p>
<p>Please use responsibly. There are some restrictions on the
public server.</p>
<script>
$(function(){
$("#gopublic").click(function(){
document.location = "http://public.pathod.net/" + $("#publicspec").val()
});
});
</script>
</div>
</div>
<div class="span6">
<div>
<h1> <a href="/docs/pathoc">pathoc</a> </h1>
<p>A perverse HTTP client.</p>
{% include "request_previewform.html" %}
<pre class="terminal">> pathoc -n 3 google.com "get:/:ir,@1"
<< 200 OK: 44177 bytes
<< 405 Method Not Allowed: 959 bytes
<< 200 OK: 44107 bytes</pre>
</div>
</div>
</div>
<div style="margin-top: 50px" class="row">
<div class="span6">
<div>
<h1> <a href="/docs/test">libpathod.test</a> </h1>
<p>Using pathod in your unit tests.</p>
</div>
</div>
<div class="span6">
<div>
<h1> <a href="/docs/test">libpathod.test</a> </h1>
<p>Using pathod in your unit tests.</p>
{% include "examples_context.html" %}
</div>
</div>
</div>
{% endblock %}
|