From 27ebcfe6e253d90af1723df2271496b00ccda4d8 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E9=A3=8E=E6=89=87=E6=BB=91=E7=BF=94=E7=BF=BC?= Date: Tue, 26 Aug 2025 14:26:59 +0000 Subject: [PATCH] Remove all illegal commas --- docs/config/fakedns.md | 2 +- docs/config/observatory.md | 2 +- docs/config/outbounds/wireguard.md | 2 +- docs/config/reverse.md | 46 +++++++++++++-------------- docs/config/transport.md | 2 +- docs/document/level-2/warp.md | 2 +- docs/en/config/fakedns.md | 2 +- docs/en/config/outbounds/loopback.md | 10 +++--- docs/en/config/outbounds/wireguard.md | 2 +- docs/en/config/transport.md | 2 +- docs/en/config/transports/mkcp.md | 2 +- docs/en/document/level-2/warp.md | 2 +- docs/ru/config/fakedns.md | 2 +- docs/ru/config/outbounds/wireguard.md | 2 +- docs/ru/config/reverse.md | 46 +++++++++++++-------------- docs/ru/config/transport.md | 2 +- docs/ru/document/level-2/warp.md | 2 +- 17 files changed, 65 insertions(+), 65 deletions(-) diff --git a/docs/config/fakedns.md b/docs/config/fakedns.md index 96b3417..89ba9d4 100644 --- a/docs/config/fakedns.md +++ b/docs/config/fakedns.md @@ -124,7 +124,7 @@ FakeDNS 本质上是一个 [DNS 服务器](./dns.md#serverobject),能够与任 "enabled": true, "destOverride": ["fakedns"], // 使用 "fakedns",或与其它 sniffer 搭配使用 "metadataOnly": false // 此项为 true 时 destOverride 仅可使用 fakedns -}, +} ``` ::: warning diff --git a/docs/config/observatory.md b/docs/config/observatory.md index b983b6e..7d464b7 100644 --- a/docs/config/observatory.md +++ b/docs/config/observatory.md @@ -58,7 +58,7 @@ "connectivity": "", "interval": "5m", "sampling": 2, - "timeout": "30s", + "timeout": "30s" } ``` diff --git a/docs/config/outbounds/wireguard.md b/docs/config/outbounds/wireguard.md index 9e2faf2..af1bfc9 100644 --- a/docs/config/outbounds/wireguard.md +++ b/docs/config/outbounds/wireguard.md @@ -108,7 +108,7 @@ PS: `Freedom` 出站的 `domainStrategy` 包含诸如 `UseIP` 的选项,在这 } ], "queryStrategy": "UseIP" // 同时查询 A 和 AAAA 记录,若不写此参数,默认值 UseIP, - }, + } ``` ### Peers diff --git a/docs/config/reverse.md b/docs/config/reverse.md index 03df890..fb01e28 100644 --- a/docs/config/reverse.md +++ b/docs/config/reverse.md @@ -39,16 +39,16 @@ "bridges": [ { "tag": "bridge", - "domain": "reverse-proxy.xray.internal", + "domain": "reverse-proxy.xray.internal" }, ], "portals": [ { "tag": "portal", - "domain": "reverse-proxy.xray.internal", + "domain": "reverse-proxy.xray.internal" }, - ], - }, + ] + } } ``` @@ -65,7 +65,7 @@ ```jsonc { "tag": "bridge", - "domain": "reverse-proxy.xray.internal", + "domain": "reverse-proxy.xray.internal" } ``` @@ -83,7 +83,7 @@ ```jsonc { "tag": "portal", - "domain": "reverse-proxy.xray.internal", + "domain": "reverse-proxy.xray.internal" } ``` @@ -130,8 +130,8 @@ outbound: "tag": "out", "protocol": "freedom", "settings": { - "redirect": "127.0.0.1:80", - }, + "redirect": "127.0.0.1:80" + } } ``` @@ -146,13 +146,13 @@ outbound: "port": 1024, "users": [ { - "id": "5783a3e7-e373-51cd-8642-c83782b807c5", + "id": "5783a3e7-e373-51cd-8642-c83782b807c5" }, - ], + ] }, - ], + ] }, - "tag": "interconn", + "tag": "interconn" } ``` @@ -167,16 +167,16 @@ outbound: "type": "field", "inboundTag": ["bridge"], "domain": ["full:reverse-proxy.xray.internal"], - "outboundTag": "interconn", + "outboundTag": "interconn" }, { // 从 portal 过来的流量,也会从 bridge 出来,但是不带上面的domain // 则路由到 out,即转发给网页服务器 "type": "field", "inboundTag": ["bridge"], - "outboundTag": "out", + "outboundTag": "out" }, - ], + ] } ``` @@ -208,8 +208,8 @@ inbound: "settings": { "address": "127.0.0.1", "port": 80, - "network": "tcp", - }, + "network": "tcp" + } } ``` @@ -222,10 +222,10 @@ inbound: "settings": { "clients": [ { - "id": "5783a3e7-e373-51cd-8642-c83782b807c5", + "id": "5783a3e7-e373-51cd-8642-c83782b807c5" }, - ], - }, + ] + } } ``` @@ -239,7 +239,7 @@ inbound: // 则路由到 portal, 最终会转发给 bridge "type": "field", "inboundTag": ["external"], - "outboundTag": "portal", + "outboundTag": "portal" }, { // 如果来自 interconn 入站,说明是来自 bridge 的尝试建立反向隧道请求, @@ -247,8 +247,8 @@ inbound: // 注意:这里进入的请求会带上了前文配置的domain,所以 portal 能够区分两种被路由到 portal 的请求 "type": "field", "inboundTag": ["interconn"], - "outboundTag": "portal", + "outboundTag": "portal" }, - ], + ] } ``` diff --git a/docs/config/transport.md b/docs/config/transport.md index f17c871..bb0088a 100644 --- a/docs/config/transport.md +++ b/docs/config/transport.md @@ -879,7 +879,7 @@ RFC-8305 实现的 happyEyeballs 仅适用于 TCP, 当目标为域名时对它 "tryDelayMs": 250, "prioritizeIPv6": false, "interleave": 1, - "maxConcurrentTry": 4, + "maxConcurrentTry": 4 } ``` diff --git a/docs/document/level-2/warp.md b/docs/document/level-2/warp.md index 4227b4f..2de3cb4 100644 --- a/docs/document/level-2/warp.md +++ b/docs/document/level-2/warp.md @@ -163,7 +163,7 @@ bash -c "$(curl -L wgcf-cli.vercel.app)" "geoip:cn" ], "outboundTag": "wireguard-1" - }, + } ``` ## 客户端使用 warp 链式代理 diff --git a/docs/en/config/fakedns.md b/docs/en/config/fakedns.md index f3ef79c..9ae882e 100644 --- a/docs/en/config/fakedns.md +++ b/docs/en/config/fakedns.md @@ -124,7 +124,7 @@ In addition, you need to enable `Sniffing` in the **client** for incoming traffi "enabled": true, "destOverride": ["fakedns"], // Use "fakedns", or use it with other sniffer. "metadataOnly": false // When this item is true, destOverride can only use fakedns. -}, +} ``` ::: warning diff --git a/docs/en/config/outbounds/loopback.md b/docs/en/config/outbounds/loopback.md index ad86271..f551fcf 100644 --- a/docs/en/config/outbounds/loopback.md +++ b/docs/en/config/outbounds/loopback.md @@ -28,7 +28,7 @@ If you need to do some more detailed routing for traffics that have been routed "tag": "need-to-split", "settings": { "inboundTag": "traffic-input", // This tag will be used as the inboundTag inside the RuleObject - }, + } }, { "tag": "tcp-output", @@ -44,14 +44,14 @@ If you need to do some more detailed routing for traffics that have been routed { "inboundTag": ["traffic-input"], // tag set in the loopback outbound setting "network": "tcp", - "outboundTag": "tcp-output", + "outboundTag": "tcp-output" }, { "inboundTag": ["traffic-input"], // tag set in the loopback outbound "network": "udp", - "outboundTag": "udp-output", + "outboundTag": "udp-output" }, - ], - }, + ] + } } ``` diff --git a/docs/en/config/outbounds/wireguard.md b/docs/en/config/outbounds/wireguard.md index c2ac06f..c015a69 100644 --- a/docs/en/config/outbounds/wireguard.md +++ b/docs/en/config/outbounds/wireguard.md @@ -98,7 +98,7 @@ When the destination address is a domain name, use the Xray-core [built-in DNS s } ], "queryStrategy": "UseIP" // If this parameter is not written, the default value is UseIP, i.e. both A and AAAA records are queried, optional values are UseIPv4 and UseIPv6, other record types are queried by the system DNS. - }, + } ``` **Note 2**: diff --git a/docs/en/config/transport.md b/docs/en/config/transport.md index e7aabde..e57faa5 100644 --- a/docs/en/config/transport.md +++ b/docs/en/config/transport.md @@ -675,7 +675,7 @@ in `freedom` settings when you set `domainStrategy` to `UseIP`/`ForceIP` just a "tryDelayMs": 250, "prioritizeIPv6": false, "interleave": 1, - "maxConcurrentTry": 4, + "maxConcurrentTry": 4 } ``` diff --git a/docs/en/config/transports/mkcp.md b/docs/en/config/transports/mkcp.md index e03d277..7824d01 100644 --- a/docs/en/config/transports/mkcp.md +++ b/docs/en/config/transports/mkcp.md @@ -10,7 +10,7 @@ Make sure the firewall on the host is configured correctly. ## KcpObject -`KcpObject` corresponds to the `kcpSettings` in the [Transport Protocol](../transport.md), +`KcpObject` corresponds to the `kcpSettings` in the [Transport Protocol](../transport.md) ```json { diff --git a/docs/en/document/level-2/warp.md b/docs/en/document/level-2/warp.md index 75f6e2c..8f02774 100644 --- a/docs/en/document/level-2/warp.md +++ b/docs/en/document/level-2/warp.md @@ -70,7 +70,7 @@ Add the following to the existing router: "geoip:cn" ], "outboundTag": "wireguard-1" - }, + } ``` ## Using Warp Chain Proxy on the Client Side diff --git a/docs/ru/config/fakedns.md b/docs/ru/config/fakedns.md index d495d70..538cc50 100644 --- a/docs/ru/config/fakedns.md +++ b/docs/ru/config/fakedns.md @@ -127,7 +127,7 @@ FakeDNS будет использовать этот блок IP-адресов "enabled": true, "destOverride": ["fakedns"], // Используйте "fakedns" или в сочетании с другими снифферами. "metadataOnly": false // Если этот параметр равен true, то в destOverride можно использовать только fakedns. -}, +} ``` ::: warning diff --git a/docs/ru/config/outbounds/wireguard.md b/docs/ru/config/outbounds/wireguard.md index 403f58d..66c666f 100644 --- a/docs/ru/config/outbounds/wireguard.md +++ b/docs/ru/config/outbounds/wireguard.md @@ -108,7 +108,7 @@ MTU нижнего уровня tun в Wireguard. } ], "queryStrategy": "UseIP" // Запрос A и AAAA одновременно. Если не указано, используется значение по умолчанию UseIP. - }, + } ``` ### Peers diff --git a/docs/ru/config/reverse.md b/docs/ru/config/reverse.md index 6a4a1de..7243d17 100644 --- a/docs/ru/config/reverse.md +++ b/docs/ru/config/reverse.md @@ -39,16 +39,16 @@ "bridges": [ { "tag": "bridge", - "domain": "reverse-proxy.xray.internal", + "domain": "reverse-proxy.xray.internal" }, ], "portals": [ { "tag": "portal", - "domain": "reverse-proxy.xray.internal", + "domain": "reverse-proxy.xray.internal" }, - ], - }, + ] + } } ``` @@ -65,7 +65,7 @@ ```jsonc { "tag": "bridge", - "domain": "reverse-proxy.xray.internal", + "domain": "reverse-proxy.xray.internal" } ``` @@ -83,7 +83,7 @@ ```jsonc { "tag": "portal", - "domain": "reverse-proxy.xray.internal", + "domain": "reverse-proxy.xray.internal" } ``` @@ -130,8 +130,8 @@ outbound: "tag": "out", "protocol": "freedom", "settings": { - "redirect": "127.0.0.1:80", - }, + "redirect": "127.0.0.1:80" + } } ``` @@ -146,13 +146,13 @@ outbound: "port": 1024, "users": [ { - "id": "5783a3e7-e373-51cd-8642-c83782b807c5", + "id": "5783a3e7-e373-51cd-8642-c83782b807c5" }, - ], + ] }, - ], + ] }, - "tag": "interconn", + "tag": "interconn" } ``` @@ -168,16 +168,16 @@ outbound: "type": "field", "inboundTag": ["bridge"], "domain": ["full:reverse-proxy.xray.internal"], - "outboundTag": "interconn", + "outboundTag": "interconn" }, { // Трафик от portal также будет выходить из bridge, но без указанного выше домена // маршрутизируем на out, то есть перенаправляем на веб-сервер "type": "field", "inboundTag": ["bridge"], - "outboundTag": "out", + "outboundTag": "out" }, - ], + ] } ``` @@ -209,8 +209,8 @@ inbound: "settings": { "address": "127.0.0.1", "port": 80, - "network": "tcp", - }, + "network": "tcp" + } } ``` @@ -223,10 +223,10 @@ inbound: "settings": { "clients": [ { - "id": "5783a3e7-e373-51cd-8642-c83782b807c5", + "id": "5783a3e7-e373-51cd-8642-c83782b807c5" }, - ], - }, + ] + } } ``` @@ -240,7 +240,7 @@ inbound: // маршрутизируем на portal, который в конечном итоге перенаправит его на bridge "type": "field", "inboundTag": ["external"], - "outboundTag": "portal", + "outboundTag": "portal" }, { // Если входящее соединение от interconn, значит, это запрос от bridge для установления обратного туннеля, @@ -249,8 +249,8 @@ inbound: // маршрутизируемых на portal. "type": "field", "inboundTag": ["interconn"], - "outboundTag": "portal", + "outboundTag": "portal" }, - ], + ] } ``` diff --git a/docs/ru/config/transport.md b/docs/ru/config/transport.md index 249a4e9..2e4bd3e 100644 --- a/docs/ru/config/transport.md +++ b/docs/ru/config/transport.md @@ -881,7 +881,7 @@ PS: Если трафик домена, например, обычный веб- "tryDelayMs": 250, "prioritizeIPv6": false, "interleave": 1, - "maxConcurrentTry": 4, + "maxConcurrentTry": 4 } ``` diff --git a/docs/ru/document/level-2/warp.md b/docs/ru/document/level-2/warp.md index 37766e1..247df89 100644 --- a/docs/ru/document/level-2/warp.md +++ b/docs/ru/document/level-2/warp.md @@ -169,7 +169,7 @@ bash -c "$(curl -L wgcf-cli.vercel.app)" "geoip:cn" ], "outboundTag": "wireguard-1" - }, + } ``` ## Использование Warp в качестве прокси-сервера в цепочке на клиенте