From 232893f2dc049fb03ee1cf2bd17e07773e69dbb7 Mon Sep 17 00:00:00 2001 From: Traines Date: Sat, 11 Jan 2025 18:15:13 +0000 Subject: [PATCH] dumps --- .npmignore | 1 - docs/dumps/readme.md | 6 ++++-- package.json | 3 ++- 3 files changed, 6 insertions(+), 4 deletions(-) delete mode 100644 .npmignore diff --git a/.npmignore b/.npmignore deleted file mode 100644 index a805f67a..00000000 --- a/.npmignore +++ /dev/null @@ -1 +0,0 @@ -/docs/dumps/ \ No newline at end of file diff --git a/docs/dumps/readme.md b/docs/dumps/readme.md index 3718bb5e..e4c4d13b 100644 --- a/docs/dumps/readme.md +++ b/docs/dumps/readme.md @@ -2,7 +2,9 @@ In this directory, some intercepted traffic from DB Navigator. (Repo license does not apply to this directory.) -How to intercept: +You can browse some responses of the bahn.de API and others in the [fixtures](https://github.com/public-transport/db-vendo-client/tree/main/test/fixtures) and [e2e fixtures](https://github.com/public-transport/db-vendo-client/tree/main/test/e2e/fixtures). + +How to intercept DB Navigator traffic: 1. Download/extract Split APK 2. Merge APK (e.g. using [APKEditor](https://github.com/REAndroid/APKEditor)) @@ -10,4 +12,4 @@ How to intercept: 4. edit [res/xml/network_security_config.xml](https://developer.android.com/privacy-and-security/security-config) to allow user CAs not just in debug 5. recompile using apktool, sign 6. install on an Android -7. intercept with a mitm decryption tool of your choice by installing CA cert into Android store (e.g. PCAPdroid with mitm addon) +7. intercept with a mitm decryption tool of your choice by installing CA cert into Android store (e.g. [PCAPdroid](https://github.com/emanuele-f/PCAPdroid) with [mitm addon](https://github.com/emanuele-f/PCAPdroid-mitm), no root needed) diff --git a/package.json b/package.json index 238d04ae..af133d7a 100644 --- a/package.json +++ b/package.json @@ -13,7 +13,8 @@ "parse", "format", "p", - "docs" + "docs", + "!docs/dumps/*" ], "author": "Traines ", "contributors": [