v0.15.0
Spy mode
Thanks to @3sunnysideup, Hoverfly has a new spy
mode. When it is set, Hoverfly will only simulate the APIs that you have defined, and call real APIs for anything else. It is deemed useful if the service under test has different external dependencies, and you want to spy on particular endpoints only. To use this new feature, simply set:
$ hoverctl mode spy
Plain HTTP tunneling
This setting allows Hoverfly to handle CONNECT requests for non-TLS tunnelling, making it possible to use Hoverly with Netty-based HTTP client such as reactor-netty.
$ hoverfly -plain-http-tunneling
Network interface binding
Hoverfly now binds to loopback interface by default and prevents firewall alerts being triggered when running on Windows machine. If you still need Hoverfly to listen on all the network interfaces, you can do so by setting:
$ hoverfly -listen-on-host 0.0.0.0
Other minor improvements
hoverctl status
is now showing if Hoverfly is running on proxy or webserver mode- You can now pass command line arguments when running Hoverfly Docker image, eg.
$ docker run -d -p 8888:8888 -p 8500:8500 spectolabs/hoverfly -webserver