Remove all illegal commas
parent
af6ffaa1b6
commit
27ebcfe6e2
|
@ -124,7 +124,7 @@ FakeDNS 本质上是一个 [DNS 服务器](./dns.md#serverobject),能够与任
|
|||
"enabled": true,
|
||||
"destOverride": ["fakedns"], // 使用 "fakedns",或与其它 sniffer 搭配使用
|
||||
"metadataOnly": false // 此项为 true 时 destOverride 仅可使用 fakedns
|
||||
},
|
||||
}
|
||||
```
|
||||
|
||||
::: warning
|
||||
|
|
|
@ -58,7 +58,7 @@
|
|||
"connectivity": "",
|
||||
"interval": "5m",
|
||||
"sampling": 2,
|
||||
"timeout": "30s",
|
||||
"timeout": "30s"
|
||||
}
|
||||
```
|
||||
|
||||
|
|
|
@ -108,7 +108,7 @@ PS: `Freedom` 出站的 `domainStrategy` 包含诸如 `UseIP` 的选项,在这
|
|||
}
|
||||
],
|
||||
"queryStrategy": "UseIP" // 同时查询 A 和 AAAA 记录,若不写此参数,默认值 UseIP,
|
||||
},
|
||||
}
|
||||
```
|
||||
|
||||
### Peers
|
||||
|
|
|
@ -39,16 +39,16 @@
|
|||
"bridges": [
|
||||
{
|
||||
"tag": "bridge",
|
||||
"domain": "reverse-proxy.xray.internal",
|
||||
"domain": "reverse-proxy.xray.internal"
|
||||
},
|
||||
],
|
||||
"portals": [
|
||||
{
|
||||
"tag": "portal",
|
||||
"domain": "reverse-proxy.xray.internal",
|
||||
"domain": "reverse-proxy.xray.internal"
|
||||
},
|
||||
],
|
||||
},
|
||||
]
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -65,7 +65,7 @@
|
|||
```jsonc
|
||||
{
|
||||
"tag": "bridge",
|
||||
"domain": "reverse-proxy.xray.internal",
|
||||
"domain": "reverse-proxy.xray.internal"
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -83,7 +83,7 @@
|
|||
```jsonc
|
||||
{
|
||||
"tag": "portal",
|
||||
"domain": "reverse-proxy.xray.internal",
|
||||
"domain": "reverse-proxy.xray.internal"
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -130,8 +130,8 @@ outbound:
|
|||
"tag": "out",
|
||||
"protocol": "freedom",
|
||||
"settings": {
|
||||
"redirect": "127.0.0.1:80",
|
||||
},
|
||||
"redirect": "127.0.0.1:80"
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -146,13 +146,13 @@ outbound:
|
|||
"port": 1024,
|
||||
"users": [
|
||||
{
|
||||
"id": "5783a3e7-e373-51cd-8642-c83782b807c5",
|
||||
"id": "5783a3e7-e373-51cd-8642-c83782b807c5"
|
||||
},
|
||||
],
|
||||
]
|
||||
},
|
||||
],
|
||||
]
|
||||
},
|
||||
"tag": "interconn",
|
||||
"tag": "interconn"
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -167,16 +167,16 @@ outbound:
|
|||
"type": "field",
|
||||
"inboundTag": ["bridge"],
|
||||
"domain": ["full:reverse-proxy.xray.internal"],
|
||||
"outboundTag": "interconn",
|
||||
"outboundTag": "interconn"
|
||||
},
|
||||
{
|
||||
// 从 portal 过来的流量,也会从 bridge 出来,但是不带上面的domain
|
||||
// 则路由到 out,即转发给网页服务器
|
||||
"type": "field",
|
||||
"inboundTag": ["bridge"],
|
||||
"outboundTag": "out",
|
||||
"outboundTag": "out"
|
||||
},
|
||||
],
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -208,8 +208,8 @@ inbound:
|
|||
"settings": {
|
||||
"address": "127.0.0.1",
|
||||
"port": 80,
|
||||
"network": "tcp",
|
||||
},
|
||||
"network": "tcp"
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -222,10 +222,10 @@ inbound:
|
|||
"settings": {
|
||||
"clients": [
|
||||
{
|
||||
"id": "5783a3e7-e373-51cd-8642-c83782b807c5",
|
||||
"id": "5783a3e7-e373-51cd-8642-c83782b807c5"
|
||||
},
|
||||
],
|
||||
},
|
||||
]
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -239,7 +239,7 @@ inbound:
|
|||
// 则路由到 portal, 最终会转发给 bridge
|
||||
"type": "field",
|
||||
"inboundTag": ["external"],
|
||||
"outboundTag": "portal",
|
||||
"outboundTag": "portal"
|
||||
},
|
||||
{
|
||||
// 如果来自 interconn 入站,说明是来自 bridge 的尝试建立反向隧道请求,
|
||||
|
@ -247,8 +247,8 @@ inbound:
|
|||
// 注意:这里进入的请求会带上了前文配置的domain,所以 portal 能够区分两种被路由到 portal 的请求
|
||||
"type": "field",
|
||||
"inboundTag": ["interconn"],
|
||||
"outboundTag": "portal",
|
||||
"outboundTag": "portal"
|
||||
},
|
||||
],
|
||||
]
|
||||
}
|
||||
```
|
||||
|
|
|
@ -879,7 +879,7 @@ RFC-8305 实现的 happyEyeballs 仅适用于 TCP, 当目标为域名时对它
|
|||
"tryDelayMs": 250,
|
||||
"prioritizeIPv6": false,
|
||||
"interleave": 1,
|
||||
"maxConcurrentTry": 4,
|
||||
"maxConcurrentTry": 4
|
||||
}
|
||||
```
|
||||
|
||||
|
|
|
@ -163,7 +163,7 @@ bash -c "$(curl -L wgcf-cli.vercel.app)"
|
|||
"geoip:cn"
|
||||
],
|
||||
"outboundTag": "wireguard-1"
|
||||
},
|
||||
}
|
||||
```
|
||||
|
||||
## 客户端使用 warp 链式代理
|
||||
|
|
|
@ -124,7 +124,7 @@ In addition, you need to enable `Sniffing` in the **client** for incoming traffi
|
|||
"enabled": true,
|
||||
"destOverride": ["fakedns"], // Use "fakedns", or use it with other sniffer.
|
||||
"metadataOnly": false // When this item is true, destOverride can only use fakedns.
|
||||
},
|
||||
}
|
||||
```
|
||||
|
||||
::: warning
|
||||
|
|
|
@ -28,7 +28,7 @@ If you need to do some more detailed routing for traffics that have been routed
|
|||
"tag": "need-to-split",
|
||||
"settings": {
|
||||
"inboundTag": "traffic-input", // This tag will be used as the inboundTag inside the RuleObject
|
||||
},
|
||||
}
|
||||
},
|
||||
{
|
||||
"tag": "tcp-output",
|
||||
|
@ -44,14 +44,14 @@ If you need to do some more detailed routing for traffics that have been routed
|
|||
{
|
||||
"inboundTag": ["traffic-input"], // tag set in the loopback outbound setting
|
||||
"network": "tcp",
|
||||
"outboundTag": "tcp-output",
|
||||
"outboundTag": "tcp-output"
|
||||
},
|
||||
{
|
||||
"inboundTag": ["traffic-input"], // tag set in the loopback outbound
|
||||
"network": "udp",
|
||||
"outboundTag": "udp-output",
|
||||
"outboundTag": "udp-output"
|
||||
},
|
||||
],
|
||||
},
|
||||
]
|
||||
}
|
||||
}
|
||||
```
|
||||
|
|
|
@ -98,7 +98,7 @@ When the destination address is a domain name, use the Xray-core [built-in DNS s
|
|||
}
|
||||
],
|
||||
"queryStrategy": "UseIP" // If this parameter is not written, the default value is UseIP, i.e. both A and AAAA records are queried, optional values are UseIPv4 and UseIPv6, other record types are queried by the system DNS.
|
||||
},
|
||||
}
|
||||
```
|
||||
|
||||
**Note 2**:
|
||||
|
|
|
@ -675,7 +675,7 @@ in `freedom` settings when you set `domainStrategy` to `UseIP`/`ForceIP` just a
|
|||
"tryDelayMs": 250,
|
||||
"prioritizeIPv6": false,
|
||||
"interleave": 1,
|
||||
"maxConcurrentTry": 4,
|
||||
"maxConcurrentTry": 4
|
||||
}
|
||||
```
|
||||
|
||||
|
|
|
@ -10,7 +10,7 @@ Make sure the firewall on the host is configured correctly.
|
|||
|
||||
## KcpObject
|
||||
|
||||
`KcpObject` corresponds to the `kcpSettings` in the [Transport Protocol](../transport.md),
|
||||
`KcpObject` corresponds to the `kcpSettings` in the [Transport Protocol](../transport.md)
|
||||
|
||||
```json
|
||||
{
|
||||
|
|
|
@ -70,7 +70,7 @@ Add the following to the existing router:
|
|||
"geoip:cn"
|
||||
],
|
||||
"outboundTag": "wireguard-1"
|
||||
},
|
||||
}
|
||||
```
|
||||
|
||||
## Using Warp Chain Proxy on the Client Side
|
||||
|
|
|
@ -127,7 +127,7 @@ FakeDNS будет использовать этот блок IP-адресов
|
|||
"enabled": true,
|
||||
"destOverride": ["fakedns"], // Используйте "fakedns" или в сочетании с другими снифферами.
|
||||
"metadataOnly": false // Если этот параметр равен true, то в destOverride можно использовать только fakedns.
|
||||
},
|
||||
}
|
||||
```
|
||||
|
||||
::: warning
|
||||
|
|
|
@ -108,7 +108,7 @@ MTU нижнего уровня tun в Wireguard.
|
|||
}
|
||||
],
|
||||
"queryStrategy": "UseIP" // Запрос A и AAAA одновременно. Если не указано, используется значение по умолчанию UseIP.
|
||||
},
|
||||
}
|
||||
```
|
||||
|
||||
### Peers
|
||||
|
|
|
@ -39,16 +39,16 @@
|
|||
"bridges": [
|
||||
{
|
||||
"tag": "bridge",
|
||||
"domain": "reverse-proxy.xray.internal",
|
||||
"domain": "reverse-proxy.xray.internal"
|
||||
},
|
||||
],
|
||||
"portals": [
|
||||
{
|
||||
"tag": "portal",
|
||||
"domain": "reverse-proxy.xray.internal",
|
||||
"domain": "reverse-proxy.xray.internal"
|
||||
},
|
||||
],
|
||||
},
|
||||
]
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -65,7 +65,7 @@
|
|||
```jsonc
|
||||
{
|
||||
"tag": "bridge",
|
||||
"domain": "reverse-proxy.xray.internal",
|
||||
"domain": "reverse-proxy.xray.internal"
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -83,7 +83,7 @@
|
|||
```jsonc
|
||||
{
|
||||
"tag": "portal",
|
||||
"domain": "reverse-proxy.xray.internal",
|
||||
"domain": "reverse-proxy.xray.internal"
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -130,8 +130,8 @@ outbound:
|
|||
"tag": "out",
|
||||
"protocol": "freedom",
|
||||
"settings": {
|
||||
"redirect": "127.0.0.1:80",
|
||||
},
|
||||
"redirect": "127.0.0.1:80"
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -146,13 +146,13 @@ outbound:
|
|||
"port": 1024,
|
||||
"users": [
|
||||
{
|
||||
"id": "5783a3e7-e373-51cd-8642-c83782b807c5",
|
||||
"id": "5783a3e7-e373-51cd-8642-c83782b807c5"
|
||||
},
|
||||
],
|
||||
]
|
||||
},
|
||||
],
|
||||
]
|
||||
},
|
||||
"tag": "interconn",
|
||||
"tag": "interconn"
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -168,16 +168,16 @@ outbound:
|
|||
"type": "field",
|
||||
"inboundTag": ["bridge"],
|
||||
"domain": ["full:reverse-proxy.xray.internal"],
|
||||
"outboundTag": "interconn",
|
||||
"outboundTag": "interconn"
|
||||
},
|
||||
{
|
||||
// Трафик от portal также будет выходить из bridge, но без указанного выше домена
|
||||
// маршрутизируем на out, то есть перенаправляем на веб-сервер
|
||||
"type": "field",
|
||||
"inboundTag": ["bridge"],
|
||||
"outboundTag": "out",
|
||||
"outboundTag": "out"
|
||||
},
|
||||
],
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -209,8 +209,8 @@ inbound:
|
|||
"settings": {
|
||||
"address": "127.0.0.1",
|
||||
"port": 80,
|
||||
"network": "tcp",
|
||||
},
|
||||
"network": "tcp"
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -223,10 +223,10 @@ inbound:
|
|||
"settings": {
|
||||
"clients": [
|
||||
{
|
||||
"id": "5783a3e7-e373-51cd-8642-c83782b807c5",
|
||||
"id": "5783a3e7-e373-51cd-8642-c83782b807c5"
|
||||
},
|
||||
],
|
||||
},
|
||||
]
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -240,7 +240,7 @@ inbound:
|
|||
// маршрутизируем на portal, который в конечном итоге перенаправит его на bridge
|
||||
"type": "field",
|
||||
"inboundTag": ["external"],
|
||||
"outboundTag": "portal",
|
||||
"outboundTag": "portal"
|
||||
},
|
||||
{
|
||||
// Если входящее соединение от interconn, значит, это запрос от bridge для установления обратного туннеля,
|
||||
|
@ -249,8 +249,8 @@ inbound:
|
|||
// маршрутизируемых на portal.
|
||||
"type": "field",
|
||||
"inboundTag": ["interconn"],
|
||||
"outboundTag": "portal",
|
||||
"outboundTag": "portal"
|
||||
},
|
||||
],
|
||||
]
|
||||
}
|
||||
```
|
||||
|
|
|
@ -881,7 +881,7 @@ PS: Если трафик домена, например, обычный веб-
|
|||
"tryDelayMs": 250,
|
||||
"prioritizeIPv6": false,
|
||||
"interleave": 1,
|
||||
"maxConcurrentTry": 4,
|
||||
"maxConcurrentTry": 4
|
||||
}
|
||||
```
|
||||
|
||||
|
|
|
@ -169,7 +169,7 @@ bash -c "$(curl -L wgcf-cli.vercel.app)"
|
|||
"geoip:cn"
|
||||
],
|
||||
"outboundTag": "wireguard-1"
|
||||
},
|
||||
}
|
||||
```
|
||||
|
||||
## Использование Warp в качестве прокси-сервера в цепочке на клиенте
|
||||
|
|
Loading…
Reference in New Issue