A command-line tool for analyzing and filtering log files from Escape.
# Clone the repository
git clone https://github.com/yourusername/escape-logs-analyzer.git
cd escape-logs-analyzer
# Install dependencies
make install
# Start the analyzer with a specific log file
app-cli analyzse file=your_log_file.zip
list [filters]
: List all requests with their detailsinfo <number/filename> [filters] [--no-body]
: Show information about a specific file- You can display multiple files:
info 1 2 3 4
- Use
--no-body
to hide request and response bodies
- You can display multiple files:
summary [filters]
: Show the summary per tested endpointshelp
: Show this help messagequit
orq
: Exit the shell
Filters can be specified as key=value pairs:
method=GET
: Filter by HTTP methodstatus_code=200
: Filter by status codecontent_type=application/json
: Filter by content typerequester=oracle
: Filter by requestersize=100-1000
: Filter by response size rangeurl=api/users
: Filter by URL patternoperation=login
: Filter by operation namecoverage=OK
: Filter by coverage statusendpoint=/users
: Filter by endpoint namein_schema=True
: Only keep the endpoints in the schema for Happy Flow Validation
You can invert any filter by adding a !
prefix:
method=!GET
: All methods except GETstatus_code=!200
: All status codes except 200content_type=!application/json
: All content types except application/json