update ui

This commit is contained in:
加里 2014-12-08 17:24:02 +08:00
parent 4ef65cf4f3
commit a4c312d64a
3 changed files with 9 additions and 6 deletions

View File

@ -70,10 +70,9 @@ After configuring rootCA, anyproxy could help to decrypt https requests, whose a
* using ``openssl version -a `` to make sure it is accessible via you command line.
#### step 2 - generate a rootCA and trust it
* you should do this when it is the first time to start anyproxy
* execute ``sudo anyproxy --root`` ,follow the instructions on screen
* [important!]you will see some tip like *rootCA generated at : ~/.anyproxy_certs... . ``cd`` to that directory, add/trust the rootCA.crt file to your system keychain. In OSX, you may do that by open the .crt file directly
* when debug https requests, you have to trust this rootCA on all of your clients.
* execute ``sudo anyproxy --root``
* start anyproxy by ``anyproxy``, fetch rootCA.crt via http://localhost:8002/fetchCrtFile, then open and trust it.
* you should trust this rootCA on all of your clients.
#### to intercept(decrypt) https requests
* start your anyproxy as normal. When rootCA is generated, it will intercept all the https requests for you automatically.

View File

@ -182,8 +182,8 @@ function proxyServer(option){
});
var tipText,webUrl;
webUrl = "http://" + ip.address() + ":" + proxyWebPort +"/";
tipText = "GUI interface started at : " + webUrl;
webUrl = "http://" + ip.address() + ":" + proxyWebPort +"/";
tipText = "GUI interface started at : " + webUrl + "\n";
console.log(color.green(tipText));
// tipText = "[alpha]qr code to for iOS client: " + webUrl + "qr";

View File

@ -7,6 +7,10 @@
url('iconfont.svg#uxiconfont') format('svg'); /* iOS 4.1- */
}
body{
min-width: 1090px;
}
.iconfont{
font-family:"iconfont" !important;
font-size:16px;font-style:normal;