This is a web service which allows you to bounce HTTP requests from a local (or remote) service to your browser for easy inspection
Your randomly generated key is cbf6f969-7775-43c3-ac3d-9ee3c7137182
To bounce data into your view page, make a request to /bounce/post/cbf6f969-7775-43c3-ac3d-9ee3c7137182
This can accept POST, PUT, GET, and DELETE methods. It will display the HTTP headers, HTTP method, and any data sent with the request.
You can also use your own custom key by just going to /bounce/view/foobar (replace foobar in the URL with your desired key).
If you're constantly using this for testing of XML or JSON data, you can now specify a hash parameter for the formatter, instead of having to manually click XML or JSON in the dropdown. Example, http://netbounce.earlz.net/bounce/view/foobar#xml
The view page will refresh itself every 5 seconds and pull down any data for your key on my server.
This web service is available via HTTPS. (not a self-signed certificate) This can be handy for testing of clients which do not permit invalid certificates when sending to an HTTPS server.
Do not send any secret data here. I can't guarantee that no one else is listening in. Although I don't make the list of currently active keys public, If someone were to guess your key, they would be able to get all data you send. I can not guarantee any privacy on the data you send.
This isn't Dropbox. Your data will expire after 1 minute on the server. It may expire sooner depending on how much data you are sending. The View page checks for new data every 15 seconds
Do not send requests larger than 128Kb. I will discard them.
Yes, I know the HTTP error codes are quite incorrect right now. The MVC framework behind this, LucidMVC, is still pretty much pre-alpha. I'm surprised it works at all sometimes(although it is fast!)
Please don't ruin the party by abusing this service. I have huge bandwidth limits and this puts very little load on my server. If you make it to where I have to worry about the load, then I'll just take it offline. It would not be difficult to DDoS this service, but please don't
The source code for this is freely available under permissive 2-clause BSD license at Github. If you have an idea for a new or better request formatter, feel free to send a push request :)