Remove all illegal commas

main
风扇滑翔翼 2025-08-26 14:26:59 +00:00 committed by GitHub
parent af6ffaa1b6
commit 27ebcfe6e2
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
17 changed files with 65 additions and 65 deletions

View File

@ -124,7 +124,7 @@ FakeDNS 本质上是一个 [DNS 服务器](./dns.md#serverobject),能够与任
"enabled": true, "enabled": true,
"destOverride": ["fakedns"], // 使用 "fakedns",或与其它 sniffer 搭配使用 "destOverride": ["fakedns"], // 使用 "fakedns",或与其它 sniffer 搭配使用
"metadataOnly": false // 此项为 true 时 destOverride 仅可使用 fakedns "metadataOnly": false // 此项为 true 时 destOverride 仅可使用 fakedns
}, }
``` ```
::: warning ::: warning

View File

@ -58,7 +58,7 @@
"connectivity": "", "connectivity": "",
"interval": "5m", "interval": "5m",
"sampling": 2, "sampling": 2,
"timeout": "30s", "timeout": "30s"
} }
``` ```

View File

@ -108,7 +108,7 @@ PS: `Freedom` 出站的 `domainStrategy` 包含诸如 `UseIP` 的选项,在这
} }
], ],
"queryStrategy": "UseIP" // 同时查询 A 和 AAAA 记录,若不写此参数,默认值 UseIP "queryStrategy": "UseIP" // 同时查询 A 和 AAAA 记录,若不写此参数,默认值 UseIP
}, }
``` ```
### Peers ### Peers

View File

@ -39,16 +39,16 @@
"bridges": [ "bridges": [
{ {
"tag": "bridge", "tag": "bridge",
"domain": "reverse-proxy.xray.internal", "domain": "reverse-proxy.xray.internal"
}, },
], ],
"portals": [ "portals": [
{ {
"tag": "portal", "tag": "portal",
"domain": "reverse-proxy.xray.internal", "domain": "reverse-proxy.xray.internal"
}, },
], ]
}, }
} }
``` ```
@ -65,7 +65,7 @@
```jsonc ```jsonc
{ {
"tag": "bridge", "tag": "bridge",
"domain": "reverse-proxy.xray.internal", "domain": "reverse-proxy.xray.internal"
} }
``` ```
@ -83,7 +83,7 @@
```jsonc ```jsonc
{ {
"tag": "portal", "tag": "portal",
"domain": "reverse-proxy.xray.internal", "domain": "reverse-proxy.xray.internal"
} }
``` ```
@ -130,8 +130,8 @@ outbound:
"tag": "out", "tag": "out",
"protocol": "freedom", "protocol": "freedom",
"settings": { "settings": {
"redirect": "127.0.0.1:80", "redirect": "127.0.0.1:80"
}, }
} }
``` ```
@ -146,13 +146,13 @@ outbound:
"port": 1024, "port": 1024,
"users": [ "users": [
{ {
"id": "5783a3e7-e373-51cd-8642-c83782b807c5", "id": "5783a3e7-e373-51cd-8642-c83782b807c5"
}, },
], ]
}, },
], ]
}, },
"tag": "interconn", "tag": "interconn"
} }
``` ```
@ -167,16 +167,16 @@ outbound:
"type": "field", "type": "field",
"inboundTag": ["bridge"], "inboundTag": ["bridge"],
"domain": ["full:reverse-proxy.xray.internal"], "domain": ["full:reverse-proxy.xray.internal"],
"outboundTag": "interconn", "outboundTag": "interconn"
}, },
{ {
// 从 portal 过来的流量,也会从 bridge 出来但是不带上面的domain // 从 portal 过来的流量,也会从 bridge 出来但是不带上面的domain
// 则路由到 out即转发给网页服务器 // 则路由到 out即转发给网页服务器
"type": "field", "type": "field",
"inboundTag": ["bridge"], "inboundTag": ["bridge"],
"outboundTag": "out", "outboundTag": "out"
}, },
], ]
} }
``` ```
@ -208,8 +208,8 @@ inbound:
"settings": { "settings": {
"address": "127.0.0.1", "address": "127.0.0.1",
"port": 80, "port": 80,
"network": "tcp", "network": "tcp"
}, }
} }
``` ```
@ -222,10 +222,10 @@ inbound:
"settings": { "settings": {
"clients": [ "clients": [
{ {
"id": "5783a3e7-e373-51cd-8642-c83782b807c5", "id": "5783a3e7-e373-51cd-8642-c83782b807c5"
}, },
], ]
}, }
} }
``` ```
@ -239,7 +239,7 @@ inbound:
// 则路由到 portal, 最终会转发给 bridge // 则路由到 portal, 最终会转发给 bridge
"type": "field", "type": "field",
"inboundTag": ["external"], "inboundTag": ["external"],
"outboundTag": "portal", "outboundTag": "portal"
}, },
{ {
// 如果来自 interconn 入站,说明是来自 bridge 的尝试建立反向隧道请求, // 如果来自 interconn 入站,说明是来自 bridge 的尝试建立反向隧道请求,
@ -247,8 +247,8 @@ inbound:
// 注意这里进入的请求会带上了前文配置的domain所以 portal 能够区分两种被路由到 portal 的请求 // 注意这里进入的请求会带上了前文配置的domain所以 portal 能够区分两种被路由到 portal 的请求
"type": "field", "type": "field",
"inboundTag": ["interconn"], "inboundTag": ["interconn"],
"outboundTag": "portal", "outboundTag": "portal"
}, },
], ]
} }
``` ```

View File

@ -879,7 +879,7 @@ RFC-8305 实现的 happyEyeballs 仅适用于 TCP, 当目标为域名时对它
"tryDelayMs": 250, "tryDelayMs": 250,
"prioritizeIPv6": false, "prioritizeIPv6": false,
"interleave": 1, "interleave": 1,
"maxConcurrentTry": 4, "maxConcurrentTry": 4
} }
``` ```

View File

@ -163,7 +163,7 @@ bash -c "$(curl -L wgcf-cli.vercel.app)"
"geoip:cn" "geoip:cn"
], ],
"outboundTag": "wireguard-1" "outboundTag": "wireguard-1"
}, }
``` ```
## 客户端使用 warp 链式代理 ## 客户端使用 warp 链式代理

View File

@ -124,7 +124,7 @@ In addition, you need to enable `Sniffing` in the **client** for incoming traffi
"enabled": true, "enabled": true,
"destOverride": ["fakedns"], // Use "fakedns", or use it with other sniffer. "destOverride": ["fakedns"], // Use "fakedns", or use it with other sniffer.
"metadataOnly": false // When this item is true, destOverride can only use fakedns. "metadataOnly": false // When this item is true, destOverride can only use fakedns.
}, }
``` ```
::: warning ::: warning

View File

@ -28,7 +28,7 @@ If you need to do some more detailed routing for traffics that have been routed
"tag": "need-to-split", "tag": "need-to-split",
"settings": { "settings": {
"inboundTag": "traffic-input", // This tag will be used as the inboundTag inside the RuleObject "inboundTag": "traffic-input", // This tag will be used as the inboundTag inside the RuleObject
}, }
}, },
{ {
"tag": "tcp-output", "tag": "tcp-output",
@ -44,14 +44,14 @@ If you need to do some more detailed routing for traffics that have been routed
{ {
"inboundTag": ["traffic-input"], // tag set in the loopback outbound setting "inboundTag": ["traffic-input"], // tag set in the loopback outbound setting
"network": "tcp", "network": "tcp",
"outboundTag": "tcp-output", "outboundTag": "tcp-output"
}, },
{ {
"inboundTag": ["traffic-input"], // tag set in the loopback outbound "inboundTag": ["traffic-input"], // tag set in the loopback outbound
"network": "udp", "network": "udp",
"outboundTag": "udp-output", "outboundTag": "udp-output"
}, },
], ]
}, }
} }
``` ```

View File

@ -98,7 +98,7 @@ When the destination address is a domain name, use the Xray-core [built-in DNS s
} }
], ],
"queryStrategy": "UseIP" // If this parameter is not written, the default value is UseIP, i.e. both A and AAAA records are queried, optional values are UseIPv4 and UseIPv6, other record types are queried by the system DNS. "queryStrategy": "UseIP" // If this parameter is not written, the default value is UseIP, i.e. both A and AAAA records are queried, optional values are UseIPv4 and UseIPv6, other record types are queried by the system DNS.
}, }
``` ```
**Note 2** **Note 2**

View File

@ -675,7 +675,7 @@ in `freedom` settings when you set `domainStrategy` to `UseIP`/`ForceIP` just a
"tryDelayMs": 250, "tryDelayMs": 250,
"prioritizeIPv6": false, "prioritizeIPv6": false,
"interleave": 1, "interleave": 1,
"maxConcurrentTry": 4, "maxConcurrentTry": 4
} }
``` ```

View File

@ -10,7 +10,7 @@ Make sure the firewall on the host is configured correctly.
## KcpObject ## KcpObject
`KcpObject` corresponds to the `kcpSettings` in the [Transport Protocol](../transport.md), `KcpObject` corresponds to the `kcpSettings` in the [Transport Protocol](../transport.md)
```json ```json
{ {

View File

@ -70,7 +70,7 @@ Add the following to the existing router:
"geoip:cn" "geoip:cn"
], ],
"outboundTag": "wireguard-1" "outboundTag": "wireguard-1"
}, }
``` ```
## Using Warp Chain Proxy on the Client Side ## Using Warp Chain Proxy on the Client Side

View File

@ -127,7 +127,7 @@ FakeDNS будет использовать этот блок IP-адресов
"enabled": true, "enabled": true,
"destOverride": ["fakedns"], // Используйте "fakedns" или в сочетании с другими снифферами. "destOverride": ["fakedns"], // Используйте "fakedns" или в сочетании с другими снифферами.
"metadataOnly": false // Если этот параметр равен true, то в destOverride можно использовать только fakedns. "metadataOnly": false // Если этот параметр равен true, то в destOverride можно использовать только fakedns.
}, }
``` ```
::: warning ::: warning

View File

@ -108,7 +108,7 @@ MTU нижнего уровня tun в Wireguard.
} }
], ],
"queryStrategy": "UseIP" // Запрос A и AAAA одновременно. Если не указано, используется значение по умолчанию UseIP. "queryStrategy": "UseIP" // Запрос A и AAAA одновременно. Если не указано, используется значение по умолчанию UseIP.
}, }
``` ```
### Peers ### Peers

View File

@ -39,16 +39,16 @@
"bridges": [ "bridges": [
{ {
"tag": "bridge", "tag": "bridge",
"domain": "reverse-proxy.xray.internal", "domain": "reverse-proxy.xray.internal"
}, },
], ],
"portals": [ "portals": [
{ {
"tag": "portal", "tag": "portal",
"domain": "reverse-proxy.xray.internal", "domain": "reverse-proxy.xray.internal"
}, },
], ]
}, }
} }
``` ```
@ -65,7 +65,7 @@
```jsonc ```jsonc
{ {
"tag": "bridge", "tag": "bridge",
"domain": "reverse-proxy.xray.internal", "domain": "reverse-proxy.xray.internal"
} }
``` ```
@ -83,7 +83,7 @@
```jsonc ```jsonc
{ {
"tag": "portal", "tag": "portal",
"domain": "reverse-proxy.xray.internal", "domain": "reverse-proxy.xray.internal"
} }
``` ```
@ -130,8 +130,8 @@ outbound:
"tag": "out", "tag": "out",
"protocol": "freedom", "protocol": "freedom",
"settings": { "settings": {
"redirect": "127.0.0.1:80", "redirect": "127.0.0.1:80"
}, }
} }
``` ```
@ -146,13 +146,13 @@ outbound:
"port": 1024, "port": 1024,
"users": [ "users": [
{ {
"id": "5783a3e7-e373-51cd-8642-c83782b807c5", "id": "5783a3e7-e373-51cd-8642-c83782b807c5"
}, },
], ]
}, },
], ]
}, },
"tag": "interconn", "tag": "interconn"
} }
``` ```
@ -168,16 +168,16 @@ outbound:
"type": "field", "type": "field",
"inboundTag": ["bridge"], "inboundTag": ["bridge"],
"domain": ["full:reverse-proxy.xray.internal"], "domain": ["full:reverse-proxy.xray.internal"],
"outboundTag": "interconn", "outboundTag": "interconn"
}, },
{ {
// Трафик от portal также будет выходить из bridge, но без указанного выше домена // Трафик от portal также будет выходить из bridge, но без указанного выше домена
// маршрутизируем на out, то есть перенаправляем на веб-сервер // маршрутизируем на out, то есть перенаправляем на веб-сервер
"type": "field", "type": "field",
"inboundTag": ["bridge"], "inboundTag": ["bridge"],
"outboundTag": "out", "outboundTag": "out"
}, },
], ]
} }
``` ```
@ -209,8 +209,8 @@ inbound:
"settings": { "settings": {
"address": "127.0.0.1", "address": "127.0.0.1",
"port": 80, "port": 80,
"network": "tcp", "network": "tcp"
}, }
} }
``` ```
@ -223,10 +223,10 @@ inbound:
"settings": { "settings": {
"clients": [ "clients": [
{ {
"id": "5783a3e7-e373-51cd-8642-c83782b807c5", "id": "5783a3e7-e373-51cd-8642-c83782b807c5"
}, },
], ]
}, }
} }
``` ```
@ -240,7 +240,7 @@ inbound:
// маршрутизируем на portal, который в конечном итоге перенаправит его на bridge // маршрутизируем на portal, который в конечном итоге перенаправит его на bridge
"type": "field", "type": "field",
"inboundTag": ["external"], "inboundTag": ["external"],
"outboundTag": "portal", "outboundTag": "portal"
}, },
{ {
// Если входящее соединение от interconn, значит, это запрос от bridge для установления обратного туннеля, // Если входящее соединение от interconn, значит, это запрос от bridge для установления обратного туннеля,
@ -249,8 +249,8 @@ inbound:
// маршрутизируемых на portal. // маршрутизируемых на portal.
"type": "field", "type": "field",
"inboundTag": ["interconn"], "inboundTag": ["interconn"],
"outboundTag": "portal", "outboundTag": "portal"
}, },
], ]
} }
``` ```

View File

@ -881,7 +881,7 @@ PS: Если трафик домена, например, обычный веб-
"tryDelayMs": 250, "tryDelayMs": 250,
"prioritizeIPv6": false, "prioritizeIPv6": false,
"interleave": 1, "interleave": 1,
"maxConcurrentTry": 4, "maxConcurrentTry": 4
} }
``` ```

View File

@ -169,7 +169,7 @@ bash -c "$(curl -L wgcf-cli.vercel.app)"
"geoip:cn" "geoip:cn"
], ],
"outboundTag": "wireguard-1" "outboundTag": "wireguard-1"
}, }
``` ```
## Использование Warp в качестве прокси-сервера в цепочке на клиенте ## Использование Warp в качестве прокси-сервера в цепочке на клиенте