出入码下拉刷新功能;内网穿透配置文件
This commit is contained in:
4
intranet-penetration/.gitignore
vendored
Normal file
4
intranet-penetration/.gitignore
vendored
Normal file
@@ -0,0 +1,4 @@
|
||||
bin/rathole
|
||||
bin/rathole.exe
|
||||
conf/client.toml
|
||||
conf/server.toml
|
29
intranet-penetration/README.md
Normal file
29
intranet-penetration/README.md
Normal file
@@ -0,0 +1,29 @@
|
||||
# 内网穿透
|
||||
|
||||
> 开发时,在本地电脑启动后端服务,然后通过内网穿透进行小程序真机调试。
|
||||
|
||||
需要有一台公网服务器,一个域名(可选),以及服务器打开对应端口
|
||||
|
||||
## bin 二进制文件下载
|
||||
|
||||
GitHub: https://github.com/rapiz1/rathole/
|
||||
|
||||
## 配置
|
||||
|
||||
修改 conf 文件夹中配置文件
|
||||
|
||||
## 启动
|
||||
|
||||
服务端
|
||||
|
||||
```bash
|
||||
cd bin
|
||||
rathole ../conf/server.toml
|
||||
```
|
||||
|
||||
本地
|
||||
|
||||
```bash
|
||||
cd bin
|
||||
rathole.exe ../conf/client.toml
|
||||
```
|
5
intranet-penetration/conf/client.example.toml
Normal file
5
intranet-penetration/conf/client.example.toml
Normal file
@@ -0,0 +1,5 @@
|
||||
[client]
|
||||
remote_addr = "xxx.xxx.xxx.xxx:yyy" # 服务器的地址。端口必须与 `server.bind_addr` 中的端口相同。
|
||||
[client.services.zzzz]
|
||||
token = "xxxxxxxxxxxxxxxxx" # 必须与服务器相同以通过验证
|
||||
local_addr = "127.0.0.1:80" # 需要被转发的服务的地址
|
5
intranet-penetration/conf/server.example.toml
Normal file
5
intranet-penetration/conf/server.example.toml
Normal file
@@ -0,0 +1,5 @@
|
||||
[server]
|
||||
bind_addr = "xxx.xxx.xxx.xxx:yyy" # `yyy` 配置了服务端监听客户端连接的端口
|
||||
[server.services.zzzz]
|
||||
token = "xxxxxxxxxxxxxxxxx" # 用于验证的 token
|
||||
bind_addr = "0.0.0.0:aaaa" # `aaaa` 配置暴露给互联网的端口
|
Reference in New Issue
Block a user