Remove all illegal commas

main
风扇滑翔翼 2025-08-26 14:26:59 +00:00 committed by GitHub
parent af6ffaa1b6
commit 27ebcfe6e2
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
17 changed files with 65 additions and 65 deletions

View File

@ -124,7 +124,7 @@ FakeDNS 本质上是一个 [DNS 服务器](./dns.md#serverobject),能够与任
"enabled": true,
"destOverride": ["fakedns"], // 使用 "fakedns",或与其它 sniffer 搭配使用
"metadataOnly": false // 此项为 true 时 destOverride 仅可使用 fakedns
},
}
```
::: warning

View File

@ -58,7 +58,7 @@
"connectivity": "",
"interval": "5m",
"sampling": 2,
"timeout": "30s",
"timeout": "30s"
}
```

View File

@ -108,7 +108,7 @@ PS: `Freedom` 出站的 `domainStrategy` 包含诸如 `UseIP` 的选项,在这
}
],
"queryStrategy": "UseIP" // 同时查询 A 和 AAAA 记录,若不写此参数,默认值 UseIP
},
}
```
### Peers

View File

@ -39,16 +39,16 @@
"bridges": [
{
"tag": "bridge",
"domain": "reverse-proxy.xray.internal",
"domain": "reverse-proxy.xray.internal"
},
],
"portals": [
{
"tag": "portal",
"domain": "reverse-proxy.xray.internal",
"domain": "reverse-proxy.xray.internal"
},
],
},
]
}
}
```
@ -65,7 +65,7 @@
```jsonc
{
"tag": "bridge",
"domain": "reverse-proxy.xray.internal",
"domain": "reverse-proxy.xray.internal"
}
```
@ -83,7 +83,7 @@
```jsonc
{
"tag": "portal",
"domain": "reverse-proxy.xray.internal",
"domain": "reverse-proxy.xray.internal"
}
```
@ -130,8 +130,8 @@ outbound:
"tag": "out",
"protocol": "freedom",
"settings": {
"redirect": "127.0.0.1:80",
},
"redirect": "127.0.0.1:80"
}
}
```
@ -146,13 +146,13 @@ outbound:
"port": 1024,
"users": [
{
"id": "5783a3e7-e373-51cd-8642-c83782b807c5",
"id": "5783a3e7-e373-51cd-8642-c83782b807c5"
},
],
]
},
],
]
},
"tag": "interconn",
"tag": "interconn"
}
```
@ -167,16 +167,16 @@ outbound:
"type": "field",
"inboundTag": ["bridge"],
"domain": ["full:reverse-proxy.xray.internal"],
"outboundTag": "interconn",
"outboundTag": "interconn"
},
{
// 从 portal 过来的流量,也会从 bridge 出来但是不带上面的domain
// 则路由到 out即转发给网页服务器
"type": "field",
"inboundTag": ["bridge"],
"outboundTag": "out",
"outboundTag": "out"
},
],
]
}
```
@ -208,8 +208,8 @@ inbound:
"settings": {
"address": "127.0.0.1",
"port": 80,
"network": "tcp",
},
"network": "tcp"
}
}
```
@ -222,10 +222,10 @@ inbound:
"settings": {
"clients": [
{
"id": "5783a3e7-e373-51cd-8642-c83782b807c5",
"id": "5783a3e7-e373-51cd-8642-c83782b807c5"
},
],
},
]
}
}
```
@ -239,7 +239,7 @@ inbound:
// 则路由到 portal, 最终会转发给 bridge
"type": "field",
"inboundTag": ["external"],
"outboundTag": "portal",
"outboundTag": "portal"
},
{
// 如果来自 interconn 入站,说明是来自 bridge 的尝试建立反向隧道请求,
@ -247,8 +247,8 @@ inbound:
// 注意这里进入的请求会带上了前文配置的domain所以 portal 能够区分两种被路由到 portal 的请求
"type": "field",
"inboundTag": ["interconn"],
"outboundTag": "portal",
"outboundTag": "portal"
},
],
]
}
```

View File

@ -879,7 +879,7 @@ RFC-8305 实现的 happyEyeballs 仅适用于 TCP, 当目标为域名时对它
"tryDelayMs": 250,
"prioritizeIPv6": false,
"interleave": 1,
"maxConcurrentTry": 4,
"maxConcurrentTry": 4
}
```

View File

@ -163,7 +163,7 @@ bash -c "$(curl -L wgcf-cli.vercel.app)"
"geoip:cn"
],
"outboundTag": "wireguard-1"
},
}
```
## 客户端使用 warp 链式代理

View File

@ -124,7 +124,7 @@ In addition, you need to enable `Sniffing` in the **client** for incoming traffi
"enabled": true,
"destOverride": ["fakedns"], // Use "fakedns", or use it with other sniffer.
"metadataOnly": false // When this item is true, destOverride can only use fakedns.
},
}
```
::: warning

View File

@ -28,7 +28,7 @@ If you need to do some more detailed routing for traffics that have been routed
"tag": "need-to-split",
"settings": {
"inboundTag": "traffic-input", // This tag will be used as the inboundTag inside the RuleObject
},
}
},
{
"tag": "tcp-output",
@ -44,14 +44,14 @@ If you need to do some more detailed routing for traffics that have been routed
{
"inboundTag": ["traffic-input"], // tag set in the loopback outbound setting
"network": "tcp",
"outboundTag": "tcp-output",
"outboundTag": "tcp-output"
},
{
"inboundTag": ["traffic-input"], // tag set in the loopback outbound
"network": "udp",
"outboundTag": "udp-output",
"outboundTag": "udp-output"
},
],
},
]
}
}
```

View File

@ -98,7 +98,7 @@ When the destination address is a domain name, use the Xray-core [built-in DNS s
}
],
"queryStrategy": "UseIP" // If this parameter is not written, the default value is UseIP, i.e. both A and AAAA records are queried, optional values are UseIPv4 and UseIPv6, other record types are queried by the system DNS.
},
}
```
**Note 2**

View File

@ -675,7 +675,7 @@ in `freedom` settings when you set `domainStrategy` to `UseIP`/`ForceIP` just a
"tryDelayMs": 250,
"prioritizeIPv6": false,
"interleave": 1,
"maxConcurrentTry": 4,
"maxConcurrentTry": 4
}
```

View File

@ -10,7 +10,7 @@ Make sure the firewall on the host is configured correctly.
## KcpObject
`KcpObject` corresponds to the `kcpSettings` in the [Transport Protocol](../transport.md),
`KcpObject` corresponds to the `kcpSettings` in the [Transport Protocol](../transport.md)
```json
{

View File

@ -70,7 +70,7 @@ Add the following to the existing router:
"geoip:cn"
],
"outboundTag": "wireguard-1"
},
}
```
## Using Warp Chain Proxy on the Client Side

View File

@ -127,7 +127,7 @@ FakeDNS будет использовать этот блок IP-адресов
"enabled": true,
"destOverride": ["fakedns"], // Используйте "fakedns" или в сочетании с другими снифферами.
"metadataOnly": false // Если этот параметр равен true, то в destOverride можно использовать только fakedns.
},
}
```
::: warning

View File

@ -108,7 +108,7 @@ MTU нижнего уровня tun в Wireguard.
}
],
"queryStrategy": "UseIP" // Запрос A и AAAA одновременно. Если не указано, используется значение по умолчанию UseIP.
},
}
```
### Peers

View File

@ -39,16 +39,16 @@
"bridges": [
{
"tag": "bridge",
"domain": "reverse-proxy.xray.internal",
"domain": "reverse-proxy.xray.internal"
},
],
"portals": [
{
"tag": "portal",
"domain": "reverse-proxy.xray.internal",
"domain": "reverse-proxy.xray.internal"
},
],
},
]
}
}
```
@ -65,7 +65,7 @@
```jsonc
{
"tag": "bridge",
"domain": "reverse-proxy.xray.internal",
"domain": "reverse-proxy.xray.internal"
}
```
@ -83,7 +83,7 @@
```jsonc
{
"tag": "portal",
"domain": "reverse-proxy.xray.internal",
"domain": "reverse-proxy.xray.internal"
}
```
@ -130,8 +130,8 @@ outbound:
"tag": "out",
"protocol": "freedom",
"settings": {
"redirect": "127.0.0.1:80",
},
"redirect": "127.0.0.1:80"
}
}
```
@ -146,13 +146,13 @@ outbound:
"port": 1024,
"users": [
{
"id": "5783a3e7-e373-51cd-8642-c83782b807c5",
"id": "5783a3e7-e373-51cd-8642-c83782b807c5"
},
],
]
},
],
]
},
"tag": "interconn",
"tag": "interconn"
}
```
@ -168,16 +168,16 @@ outbound:
"type": "field",
"inboundTag": ["bridge"],
"domain": ["full:reverse-proxy.xray.internal"],
"outboundTag": "interconn",
"outboundTag": "interconn"
},
{
// Трафик от portal также будет выходить из bridge, но без указанного выше домена
// маршрутизируем на out, то есть перенаправляем на веб-сервер
"type": "field",
"inboundTag": ["bridge"],
"outboundTag": "out",
"outboundTag": "out"
},
],
]
}
```
@ -209,8 +209,8 @@ inbound:
"settings": {
"address": "127.0.0.1",
"port": 80,
"network": "tcp",
},
"network": "tcp"
}
}
```
@ -223,10 +223,10 @@ inbound:
"settings": {
"clients": [
{
"id": "5783a3e7-e373-51cd-8642-c83782b807c5",
"id": "5783a3e7-e373-51cd-8642-c83782b807c5"
},
],
},
]
}
}
```
@ -240,7 +240,7 @@ inbound:
// маршрутизируем на portal, который в конечном итоге перенаправит его на bridge
"type": "field",
"inboundTag": ["external"],
"outboundTag": "portal",
"outboundTag": "portal"
},
{
// Если входящее соединение от interconn, значит, это запрос от bridge для установления обратного туннеля,
@ -249,8 +249,8 @@ inbound:
// маршрутизируемых на portal.
"type": "field",
"inboundTag": ["interconn"],
"outboundTag": "portal",
"outboundTag": "portal"
},
],
]
}
```

View File

@ -881,7 +881,7 @@ PS: Если трафик домена, например, обычный веб-
"tryDelayMs": 250,
"prioritizeIPv6": false,
"interleave": 1,
"maxConcurrentTry": 4,
"maxConcurrentTry": 4
}
```

View File

@ -169,7 +169,7 @@ bash -c "$(curl -L wgcf-cli.vercel.app)"
"geoip:cn"
],
"outboundTag": "wireguard-1"
},
}
```
## Использование Warp в качестве прокси-сервера в цепочке на клиенте