使用改型(Okhttp)时,如何从android studio中的log cat复制请求正文、标题(无标记)?

使用改型(Okhttp)时,如何从android studio中的log cat复制请求正文、标题(无标记)?,android,android-studio,retrofit2,logcat,okhttp3,Android,Android Studio,Retrofit2,Logcat,Okhttp3,我无法从log cat仅复制请求正文(无标签)。我认为这是一个非常有用的特性,因为您经常需要通过邮递员检查请求,并且很难再提出类似的请求(特别是如果请求是数字签名的)。下面是一个日志示例,我想不使用D:前缀复制它: D: --> POST http://url D: Content-Type: application/xml; charset=utf-8 D: Content-Length: 3586 D: <?xml version="1.0" encoding="UTF-8"?&

我无法从log cat仅复制请求正文(无标签)。我认为这是一个非常有用的特性,因为您经常需要通过邮递员检查请求,并且很难再提出类似的请求(特别是如果请求是数字签名的)。下面是一个日志示例,我想不使用D:前缀复制它:

D: --> POST http://url
D: Content-Type: application/xml; charset=utf-8
D: Content-Length: 3586
D: <?xml version="1.0" encoding="UTF-8"?><APRequest>
D: <jsonString>{"searchDate":"24.01.2019","userOrgCode":"19710003","userId":"5000000000014720"}</jsonString>
D: <dateOfSend>1548316774835</dateOfSend>
D: <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
D: <ds:SignedInfo>
D: <ds:CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"/>
D: <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
D: <ds:Reference URI="">
D: <ds:Transforms>
D: <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
D: <ds:Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments"/>
D: </ds:Transforms>
D: <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
D: <ds:DigestValue>KK5lQsy9CqracgR1YS2nZBkY2gU4ntOCtAgbPQeI7AU=</ds:DigestValue>
D: </ds:Reference>
D: </ds:SignedInfo>
D: <ds:SignatureValue>
D: T1CWxz0kgoKKFFwCBaA+oOfMunnzjF4fZEWoB5ll+Sdm6ql/mcHtJUEcVVF2MgwzYVP9O0TI5iiD
D: VGg9in36dC6WcCqb9UmNJM/I8KM1CDszwAWHLSto7dgSlE1DgXlImI2DhexcrXQyMyXVboQOPrHO
D: qbtT1Ou8hL+M8j/jxe5HMyANH55/3x83/8aae5GBxAVsaCyfJR5wWe4FXdDBRHU65RFe/JxRrDo3
D: 3sqed8P0AMtDPJwqKv3gm7y4i5sPpoRpaMTPBhKKqkZyFLT7TCVEoTbFJ1z9d7SWakTRsGNsQhr6
D: sGJ9gniyjq/J9Qw/LdC4muCQ9I6t/OJhZSW+Fg==
D: </ds:SignatureValue>
D: <ds:KeyInfo>
D: <ds:X509Data>
D: <ds:X509Certificate>
D: MIIGZTCCBE2gAwIBAgIUIH2IhoiQPOeoZt1XwaQWoelFpIAwDQYJKoZIhvcNAQELBQAwUjELMAkG
D: A1UEBhMCS1oxQzBBBgNVBAMMOtKw0JvQotCi0KvSmiDQmtCj05jQm9CQ0J3QlNCr0KDQo9Co0Ksg
D: 0J7QoNCi0JDQm9Cr0pogKFJTQSkwHhcNMTgxMTEyMDU0MjUwWhcNMTkxMTEyMDU0MjUwWjCBpzEc
D: MBoGA1UEAwwT0JDQodKa0JDQoCDTmNCh0JXQojETMBEGA1UEBAwK0JDQodKa0JDQoDEYMBYGA1UE
D: BRMPSUlOOTUwMzMxMzAwMzI0MQswCQYDVQQGEwJLWjEVMBMGA1UEBwwM0JDQodCi0JDQndCQMRUw
D: EwYDVQQIDAzQkNCh0KLQkNCd0JAxHTAbBgNVBCoMFNKa0JDQm9CY0JHQldCa0rDQm9CrMIIBIjAN
D: BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqQkJDPEj5sbIme7Qw9rpOTTVU6CG1ZVQgR/Ll9d1
D: gVtd++ZYN2uirrBhFFAGR9Hw3e3U6WbakvGw2KDp0lPprTg2Pv50lC9ghFsLik1JQ3cvpM5iRQw6
D: O8S3+2CSto3VVigCa7/Ck2rtHauOCNOUAMY9KfiAyDAfv9lLC2MzrfVEk0po2p8mrQh+le9RwQKI
D: gLJp+G/yJEgIKootISf1HZ0uyGOWy2iqLygaaRd4C8zqB6kMNb2Pvo76DHfopE/GkU0rqFQe/HMh
D: aJx5whlsgY2UQU8dHO28LKcz6HRyl+4WvObwWpmhGAXJDFfTMHsIgsSQekzfVkQbYk9INuXbxQID
D: AQABo4IB2zCCAdcwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggqgw4DAwQB
D: ATAPBgNVHSMECDAGgARbanQRMB0GA1UdDgQWBBSg7xyKYXvCr6OCr5zQ/5c0JN4I0zBeBgNVHSAE
D: VzBVMFMGByqDDgMDAgQwSDAhBggrBgEFBQcCARYVaHR0cDovL3BraS5nb3Yua3ovY3BzMCMGCCsG
D: AQUFBwICMBcMFWh0dHA6Ly9wa2kuZ292Lmt6L2NwczBWBgNVHR8ETzBNMEugSaBHhiFodHRwOi8v
D: Y3JsLnBraS5nb3Yua3ovbmNhX3JzYS5jcmyGImh0dHA6Ly9jcmwxLnBraS5nb3Yua3ovbmNhX3Jz
D: YS5jcmwwWgYDVR0uBFMwUTBPoE2gS4YjaHR0cDovL2NybC5wa2kuZ292Lmt6L25jYV9kX3JzYS5j
D: cmyGJGh0dHA6Ly9jcmwxLnBraS5nb3Yua3ovbmNhX2RfcnNhLmNybDBiBggrBgEFBQcBAQRWMFQw
D: LgYIKwYBBQUHMAKGImh0dHA6Ly9ASDFAWEQvbmNhX3JzYS5jZXIwIgYIKwYBBQUH
D: MAGGFmh0dHA6Ly9vY3NwLnBraS5nb3Yua3owDQYJKoZIhvcNAQELBQADggIBAIxnLTs4soGhmZ6s
D: AM3JB1Xu3n6+RfuXQ1nFit2wAjFU0Ptflual5nulwcAMFXnj/9A+irXEOcBWaL8vMCd4OuI49wwr
D: +QVGErNp5t3zf8m9Z7ZKkzTtrKSE9JG4hz+URnS+N2DPl/Z+uD+2SdsILuseEKHwPitio9FtYDIL
D: RGRUX9LgQfYBl7c9Kjw3+zRgvGhB4NB+KwP7I1g8QB0OBj5B6GyhKN6QaezNAdwu/kO/xsExUyPP
D: DUlJ3WZG601ngrXABmyPSSgQOagC9EGDayfBlh9cZ/tEKdCwooR2IEVskuhm4JGGeOPKoUebp9pM
D: GUXhiVFdOx7SBAvwyI4AlK8bzVvKHGFczQiwikYZ0AKqD+oK4v/7ILOFZdbTcDZz5OA/MuqKo06S
D: 7nbl89fn4qyhWSvQLwkeWQu5z2elqzgnT19wE8rUC7Q+lsX/xikKkBGweAZT4wYShB5x8opCnRfL
D: sLlo1Rs0VRN16U9EmcgWy4mP5o+QuHWAJyUiYy69WumTjQyvz5ss/vJoLsqzPl0s8uW5bQkg2OXC
D: O/MFXxnc1k7n81RzRbNx+AIn8B8f8W6qfOZ3ighgSw8hweIvtMjtN9xKYY+DRH781QeSVFfb3uUg
D: VEByOAuXc1U+F/v6TFh5DEZZaVRQrIT6OFAf2RHRVlJognrtVyK+7Dr3C0Hi
D: </ds:X509Certificate>
D: </ds:X509Data>
D: </ds:KeyInfo>
D: </ds:Signature></APRequest>
D: --> END POST (3586-byte body)
D: <-- 200 OK http://url (259ms)
D:-->POSThttp://url
D:内容类型:应用程序/xml;字符集=utf-8
D:内容长度:3586
D:
D:{“搜索日期”:“2019年1月24日”,“用户组织代码”:“19710003”,“用户ID”:“5000000000014720”}
D:1548316774835
D:
D:
D:
D:
D:
D:
D:
D:
D:
D:
D:KK5lQsy9CqracgR1YS2nZBkY2gU4ntOCtAgbPQeI7AU=
D:
D:
D:
D:T1CWXZ0KGOKFFWCBAA+oOfMunnzjF4fZEWoB5ll+Sdm6ql/MCHTJUECVF2MGWZYVP9O0Ti5IID
D:VGg9in36dC6WcCqb9UmNJM/I8KM1CDSZWAWHLSTO7DGSLE1DGXLIMI2HEXCRXQYMYXVBOQOPHO
D:qbtT1Ou8hL+M8j/jxe5HMyANH55/3x83/8aae5GBxAVsaCyfJR5wWe4FXdDBRHU65RFe/jxrdo3
D:3SQED8P0AMTDPJWQKV3GM7Y4I5SPorpAMTPBHKKQKZYFLT7TCVEOTBFJ1Z9D7SWAKTRSGNSKHR6
D:SGJ9GNYJQ/J9Qw/LdC4muCQ9I6t/OJhZSW+Fg==
D:
D:
D:
D:
D:Miigztcbe2gawibagiuih2ihoiqpoeozt1xwaqwoellfpiawdqyjkozihvcnaqelbqawujelmakg
D:A1UEBHMCS1OXQZBBGNVBAMMONTKW0JVQOTCI0KVSMIDQMTCJ05JQM9CQ0J3QLCR0KDQO9CO0KSG
D:0J7QONCI0JDQM9CR0POGKFJTQSKWHHCNMTGxMTYMDU0MJUWWHCNMTKxMTYMDU0MJUWWJCBPZEC
D:MBOGA1UEAWT0JDQODKA0JDQOCDTMNCH0JXQOJETMBEGA1UEBAWK0JDQODKA0JDQODEYMBYGA1UE
D:brmpsulootuwmzmxmzawmzi0mqswcqydvqgewjlwjevmbmga1uebwwm0jdqodci0jdqndcqmruw
D:EWYDVQQQDAZQKNCH0KLQKNCD0JAXHTABBGGNVBCOMFNKA0JDQM9CY0JHQLDCA0RDQM9CRMIIBIJAN
D:BGKQHKIG9W0BAQEFAOCAQ8AMiIBCGKCAQEAQKJDPEJ5SBIME7QW9RPOTTvU6CG1ZVQGR/Ll9d1
D:gVtd++ZYN2uirrBhFFAGR9Hw3e3U6WbakvGw2KDp0lPprTg2Pv50lC9ghFsLik1JQ3cvpM5iRQw6
D:O8S3+2CSto3VVigCa7/CK2RTHAOCNOUAM9KFIAYDAFV9LLC2MZRFEK0PO2P8MRQH+le9RwQKI
D:gLJp+G/YJEGIKOOTISF1HZ0UWIKIOWY2IQLYGAARD4C8ZQB6KMnB2PVO76DHFOPE/GkU0rqFQe/HMh
D:aJx5whlsgY2UQU8dHO28LKcz6HRyl+4WVOBWWPMHGAXJDFFTMHSIGSQEKZFWKQBYK9INUXBXQID
D:AQABo4IB2zCCAdcwDgYDVR0PAQH/BAQDAGGWG0GA1UDJQWMBQGCCSGAQUFBWMCBGGQGW4DAWQB
D:ATAPBGNVHSMECDAGGARBANQRMB0GA1UDGQWBBSG7XYKYXVCR6OCR5ZQ/5c0JN4I0zBeBgNVHSAE
D:VZBVMFMGBYQDDGMDAGQWSDAHBGGRBEGEFBQCCARYVAHR0CDOVL3BRA5NB3YUA3OVY3BZMCMGCCSG
D:AQUFBWICMBCFWH0DHA6LY9WA2KUZ292LMT6L2NWCZBWGNVHR8ETZBNMEUGSABHHIFODHRWOI8V
D:Y3JSLNBR5NB3YUA3OVBMNHX3JZYS5JCMYGIMH0DHA6LY9JCMWXLNBRA5NB3YUA3OVBMNHX3JZ
D:YS5JCMWWGYDVR0UBFMWUTBPOE2GS4YJAHR0CDOVL2NYBC5WA2KUZ292LMT6L25JYV9KX3JZYS5J
D:cmyGJGh0dHA6Ly9jcmwxLnBraS5nb3Yua3ovbmNhX2RfcnNhLmNybDBiBggrBgEFBQcBAQRWMFQw
D:LGYIKWYBBUHKGIMH0DHA6LY9ASDFAWEQVBMNHX3JZYS5JZXIWIGYKWYBBUH
D:maggfmh0dha6ly9vy3nwlnbras5nb3yua3owdqyjkozihvcnaqelbqadggaixnlts4soghmz6s
D:AM3JB1Xu3n6+RfuXQ1nFit2wAjFU0Ptflual5nulwcAMFXnj/9A+irXEOcBWaL8vMCd4OuI49wwr
D:+QVGErNp5t3zf8m9Z7ZKkzTtrKSE9JG4hz+URnS+N2DPl/Z+uD+2SDSILUSEEKHWPIPTIO9FTYDIL
D:RGRUX9LgQfYBl7c9Kjw3+zRgvGhB4NB+KwP7I1g8QB0OBj5B6GyhKN6QaezNAdwu/kO/xsExUyPP
D:DULJ3WZG601NGRXABMYPSSGQOAG9EGDAYFBLH9CZ/tEKdCwooR2IEVskuhm4JGGeOPKoUebp9pM
D:GUxHIVFDOX7SBAVWYI4ALK8BzVKHGFCZQIWIKYZ0AKQD+oK4v/7ILOFZdbTcDZz5OA/MuqKo06S
D:7nbl89fn4qyhWSvQLwkeWQu5z2elqzgnT19wE8rUC7Q+lsX/xikKkBGweAZT4wYShB5x8opCnRfL
D:sLlo1Rs0VRN16U9EmcgWy4mP5o+QUHWAJYUIY69WUMTJQYVZ5SS/vJoLsqzPl0s8uW5bQkg2OXC
D:O/MFXxnc1k7n81RzRbNx+AIN8B8F8W6QFOZ3IGHGSW8WeivTmJTN9XKYY+DRH781QeSVFfb3uUg
D:VEByOAuXc1U+F/v6TFh5DEZZaVRQrIT6OFAf2RHRVlJognrtVyK+7Dr3C0Hi
D:
D:
D:
D:
D:-->端柱(3586字节正文)

D:有很多第三方库用于分析(拦截)网络请求

如果使用okhttp作为基础


  • 在您的情况下,您可以使用这个

    使用您可以从chrome浏览器复制它谢谢,它非常有用!我只是在调试模式下运行,然后使用:从breakpoint@LinhNguyen很好的方法,我以前没有想到过,但它需要附加调试器,所以我决定使用stetho,谢谢,但现在我尝试了日志侦听器,但无法从log cat复制请求,但使用stetho时,我可以从chrome看到并复制它。非常感谢。