mirror of
https://github.com/kenzok8/small-package
synced 2025-01-09 08:59:26 +08:00
update 2024-01-25 09:17:37
This commit is contained in:
parent
c6ec7621d2
commit
88828d3e15
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -195,9 +195,7 @@ function parseShareLink(uri, features) {
|
||||
config.grpc_servicename = params.get('serviceName');
|
||||
break;
|
||||
case 'ws':
|
||||
/* We don't parse "host" param when TLS is enabled, as some providers are abusing it (host vs sni)
|
||||
* config.ws_host = params.get('host') ? decodeURIComponent(params.get('host')) : null;
|
||||
*/
|
||||
config.ws_host = params.get('host') ? decodeURIComponent(params.get('host')) : null;
|
||||
config.ws_path = params.get('path') ? decodeURIComponent(params.get('path')) : null;
|
||||
if (config.ws_path && config.ws_path.includes('?ed=')) {
|
||||
config.websocket_early_data_header = 'Sec-WebSocket-Protocol';
|
||||
@ -274,8 +272,7 @@ function parseShareLink(uri, features) {
|
||||
}
|
||||
break;
|
||||
case 'ws':
|
||||
/* We don't parse "host" param when TLS is enabled, as some providers are abusing it (host vs sni) */
|
||||
config.ws_host = (config.tls !== '1' && params.get('host')) ? decodeURIComponent(params.get('host')) : null;
|
||||
config.ws_host = params.get('host') ? decodeURIComponent(params.get('host')) : null;
|
||||
config.ws_path = params.get('path') ? decodeURIComponent(params.get('path')) : null;
|
||||
if (config.ws_path && config.ws_path.includes('?ed=')) {
|
||||
config.websocket_early_data_header = 'Sec-WebSocket-Protocol';
|
||||
@ -332,8 +329,7 @@ function parseShareLink(uri, features) {
|
||||
}
|
||||
break;
|
||||
case 'ws':
|
||||
/* We don't parse "host" param when TLS is enabled, as some providers are abusing it (host vs sni) */
|
||||
config.ws_host = (config.tls !== '1') ? uri.host : null;
|
||||
config.ws_host = uri.host;
|
||||
config.ws_path = uri.path;
|
||||
if (config.ws_path && config.ws_path.includes('?ed=')) {
|
||||
config.websocket_early_data_header = 'Sec-WebSocket-Protocol';
|
||||
@ -563,10 +559,6 @@ return view.extend({
|
||||
var encmode = this.map.lookupOption('shadowsocks_encrypt_method', section_id)[0].formvalue(section_id);
|
||||
if (encmode === 'none')
|
||||
return true;
|
||||
else if (encmode === '2022-blake3-aes-128-gcm')
|
||||
return hp.validateBase64Key(24, section_id, value);
|
||||
else if (['2022-blake3-aes-256-gcm', '2022-blake3-chacha20-poly1305'].includes(encmode))
|
||||
return hp.validateBase64Key(44, section_id, value);
|
||||
}
|
||||
if (!value)
|
||||
return _('Expecting: %s').format(_('non-empty value'));
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -259,9 +259,7 @@ function parse_uri(uri) {
|
||||
config.grpc_servicename = params.serviceName;
|
||||
break;
|
||||
case 'ws':
|
||||
/* We don't parse "host" param when TLS is enabled, as some providers are abusing it (host vs sni)
|
||||
* config.ws_host = params.host ? urldecode(params.host) : null;
|
||||
*/
|
||||
config.ws_host = params.host ? urldecode(params.host) : null;
|
||||
config.ws_path = params.path ? urldecode(params.path) : null;
|
||||
if (config.ws_path && match(config.ws_path, /\?ed=/)) {
|
||||
config.websocket_early_data_header = 'Sec-WebSocket-Protocol';
|
||||
@ -344,8 +342,7 @@ function parse_uri(uri) {
|
||||
}
|
||||
break;
|
||||
case 'ws':
|
||||
/* We don't parse "host" param when TLS is enabled, as some providers are abusing it (host vs sni) */
|
||||
config.ws_host = (config.tls !== '1' && params.host) ? urldecode(params.host) : null;
|
||||
config.ws_host = params.host ? urldecode(params.host) : null;
|
||||
config.ws_path = params.path ? urldecode(params.path) : null;
|
||||
if (config.ws_path && match(config.ws_path, /\?ed=/)) {
|
||||
config.websocket_early_data_header = 'Sec-WebSocket-Protocol';
|
||||
@ -420,8 +417,7 @@ function parse_uri(uri) {
|
||||
}
|
||||
break;
|
||||
case 'ws':
|
||||
/* We don't parse "host" param when TLS is enabled, as some providers are abusing it (host vs sni) */
|
||||
config.ws_host = (config.tls !== '1') ? uri.host : null;
|
||||
config.ws_host = uri.host;
|
||||
config.ws_path = uri.path;
|
||||
if (config.ws_path && match(config.ws_path, /\?ed=/)) {
|
||||
config.websocket_early_data_header = 'Sec-WebSocket-Protocol';
|
||||
|
Loading…
Reference in New Issue
Block a user