Skip to content

Commit ec3346b

Browse files
committed
Fix a few old references to httptoolkit.tech
1 parent 3414640 commit ec3346b

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# httptoolkit-android
22

3-
Automatic interception of Android HTTP with [HTTP Toolkit](https://httptoolkit.tech/android), for inspection, debugging & mocking.
3+
Automatic interception of Android HTTP with [HTTP Toolkit](https://httptoolkit.com/android), for inspection, debugging & mocking.
44

55
Looking to file bugs, request features or send feedback? File an issue or vote on existing ones at [github.com/httptoolkit/feedback](https://github.com/httptoolkit/feedback).
66

app/src/main/java/tech/httptoolkit/android/MainActivity.kt

+1-1
Original file line numberDiff line numberDiff line change
@@ -427,7 +427,7 @@ class MainActivity : AppCompatActivity(), CoroutineScope by MainScope() {
427427
}
428428

429429
private fun openDocs() {
430-
launchBrowser("httptoolkit.tech/docs/guides/android")
430+
launchBrowser("httptoolkit.com/docs/guides/android")
431431
}
432432

433433
private fun chooseApps() {

app/src/main/res/values/strings.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
<string name="pre_v7_connection_status_enabled_heading">Certificate trusted</string>
2626

2727
<string name="none_connection_status_details">Your HTTP Toolkit certificate is not trusted on this device, so HTTPS traffic will only be available from apps that individually include and trust it.\n\nDisconnect and reconnect to rerun HTTPS certificate setup.</string>
28-
<string name="user_connection_status_details">HTTPS interception will only be available for apps that are configured to trust user-installed certificates (<a href="https://httptoolkit.tech/docs/guides/android#intercepting-traffic-from-your-own-android-app">How?</a>)</string>
28+
<string name="user_connection_status_details">HTTPS interception will only be available for apps that are configured to trust user-installed certificates (<a href="https://httptoolkit.com/docs/guides/android#intercepting-traffic-from-your-own-android-app">How?</a>)</string>
2929
<string name="system_connection_status_details">Traffic from all intercepted applications will be available, except those using explicit certificate pinning.</string>
3030
<string name="pre_v7_connection_status_details">Traffic from all intercepted applications will be available, except those using explicit certificate pinning.</string>
3131

0 commit comments

Comments
 (0)