mirror of
https://github.com/kenzok8/small-package
synced 2025-01-07 09:16:47 +08:00
update 2024-12-11 20:41:45
This commit is contained in:
parent
5aa54dd52c
commit
a2b8e5d315
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
include $(TOPDIR)/rules.mk
|
include $(TOPDIR)/rules.mk
|
||||||
|
|
||||||
PKG_VERSION:=1.1.6-20241211
|
PKG_VERSION:=1.1.7-20241211
|
||||||
PKG_RELEASE:=
|
PKG_RELEASE:=
|
||||||
|
|
||||||
LUCI_TITLE:=LuCI support for istoredup
|
LUCI_TITLE:=LuCI support for istoredup
|
||||||
@ -15,7 +15,7 @@ endef
|
|||||||
|
|
||||||
define Package/luci-app-istoredup/prerm
|
define Package/luci-app-istoredup/prerm
|
||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
/root/usr/libexec/istorec/istoredup.sh stop
|
/usr/libexec/istorec/istoredup.sh stop
|
||||||
exit 0
|
exit 0
|
||||||
endef
|
endef
|
||||||
|
|
||||||
|
@ -416,6 +416,10 @@ if ($_SERVER['REQUEST_METHOD'] === 'POST') {
|
|||||||
$subscription_url = $_POST['subscription_url'];
|
$subscription_url = $_POST['subscription_url'];
|
||||||
$filename = $_POST['filename'];
|
$filename = $_POST['filename'];
|
||||||
|
|
||||||
|
if (strpos($subscription_url, '&flag=meta') === false) {
|
||||||
|
$subscription_url .= '&flag=meta';
|
||||||
|
}
|
||||||
|
|
||||||
if (empty($filename)) {
|
if (empty($filename)) {
|
||||||
$filename = 'config.yaml';
|
$filename = 'config.yaml';
|
||||||
}
|
}
|
||||||
@ -515,7 +519,6 @@ $current_subscription_url = getSubscriptionUrlFromFile($subscription_file);
|
|||||||
<li class="list-group-item"><strong>输入订阅链接:</strong> 在文本框中输入您的 Clash 订阅链接。</li>
|
<li class="list-group-item"><strong>输入订阅链接:</strong> 在文本框中输入您的 Clash 订阅链接。</li>
|
||||||
<li class="list-group-item"><strong>输入保存文件名:</strong> 指定保存配置文件的文件名,默认为 "config.yaml",无需添加后缀。</li>
|
<li class="list-group-item"><strong>输入保存文件名:</strong> 指定保存配置文件的文件名,默认为 "config.yaml",无需添加后缀。</li>
|
||||||
<li class="list-group-item">点击 "更新订阅" 按钮,系统将下载订阅内容,并进行转换和保存。</li>
|
<li class="list-group-item">点击 "更新订阅" 按钮,系统将下载订阅内容,并进行转换和保存。</li>
|
||||||
<li class="list-group-item"><strong>只支持Clash格式的订阅。</li>
|
|
||||||
</ul>
|
</ul>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
@ -180,7 +180,7 @@ if has_xray then
|
|||||||
|
|
||||||
o = s_xray:option(Flag, "sniffing_override_dest", translate("Override the connection destination address"))
|
o = s_xray:option(Flag, "sniffing_override_dest", translate("Override the connection destination address"))
|
||||||
o.default = 0
|
o.default = 0
|
||||||
o.description = translate("Override the connection destination address with the sniffed domain.<br />When enabled, traffic will match only by domain, ignoring IP rules.<br />If using shunt nodes, configure the domain shunt rules correctly.")
|
o.description = translate("Override the connection destination address with the sniffed domain.<br />Otherwise use sniffed domain for routing only.<br />If using shunt nodes, configure the domain shunt rules correctly.")
|
||||||
|
|
||||||
local domains_excluded = string.format("/usr/share/%s/rules/domains_excluded", appname)
|
local domains_excluded = string.format("/usr/share/%s/rules/domains_excluded", appname)
|
||||||
o = s_xray:option(TextValue, "excluded_domains", translate("Excluded Domains"), translate("If the traffic sniffing result is in this list, the destination address will not be overridden."))
|
o = s_xray:option(TextValue, "excluded_domains", translate("Excluded Domains"), translate("If the traffic sniffing result is in this list, the destination address will not be overridden."))
|
||||||
|
@ -612,8 +612,15 @@ function gen_config(var)
|
|||||||
port = tonumber(local_socks_port),
|
port = tonumber(local_socks_port),
|
||||||
protocol = "socks",
|
protocol = "socks",
|
||||||
settings = {auth = "noauth", udp = true},
|
settings = {auth = "noauth", udp = true},
|
||||||
sniffing = {enabled = true, destOverride = {"http", "tls", "quic"}}
|
sniffing = {
|
||||||
|
enabled = xray_settings.sniffing_override_dest == "1" or node.protocol == "_shunt"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
if inbound.sniffing.enabled == true then
|
||||||
|
inbound.sniffing.destOverride = {"http", "tls", "quic"}
|
||||||
|
inbound.sniffing.routeOnly = xray_settings.sniffing_override_dest ~= "1" or nil
|
||||||
|
inbound.sniffing.domainsExcluded = xray_settings.sniffing_override_dest == "1" and get_domain_excluded() or nil
|
||||||
|
end
|
||||||
if local_socks_username and local_socks_password and local_socks_username ~= "" and local_socks_password ~= "" then
|
if local_socks_username and local_socks_password and local_socks_username ~= "" and local_socks_password ~= "" then
|
||||||
inbound.settings.auth = "password"
|
inbound.settings.auth = "password"
|
||||||
inbound.settings.accounts = {
|
inbound.settings.accounts = {
|
||||||
@ -649,13 +656,15 @@ function gen_config(var)
|
|||||||
settings = {network = "tcp,udp", followRedirect = true},
|
settings = {network = "tcp,udp", followRedirect = true},
|
||||||
streamSettings = {sockopt = {tproxy = "tproxy"}},
|
streamSettings = {sockopt = {tproxy = "tproxy"}},
|
||||||
sniffing = {
|
sniffing = {
|
||||||
enabled = xray_settings.sniffing_override_dest == "1" or node.protocol == "_shunt",
|
enabled = xray_settings.sniffing_override_dest == "1" or node.protocol == "_shunt"
|
||||||
destOverride = {"http", "tls", "quic"},
|
|
||||||
metadataOnly = false,
|
|
||||||
routeOnly = node.protocol == "_shunt" and xray_settings.sniffing_override_dest ~= "1" or nil,
|
|
||||||
domainsExcluded = xray_settings.sniffing_override_dest == "1" and get_domain_excluded() or nil
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if inbound.sniffing.enabled == true then
|
||||||
|
inbound.sniffing.destOverride = {"http", "tls", "quic", (remote_dns_fake) and "fakedns"}
|
||||||
|
inbound.sniffing.metadataOnly = false
|
||||||
|
inbound.sniffing.routeOnly = xray_settings.sniffing_override_dest ~= "1" or nil
|
||||||
|
inbound.sniffing.domainsExcluded = xray_settings.sniffing_override_dest == "1" and get_domain_excluded() or nil
|
||||||
|
end
|
||||||
|
|
||||||
if tcp_redir_port then
|
if tcp_redir_port then
|
||||||
local tcp_inbound = api.clone(inbound)
|
local tcp_inbound = api.clone(inbound)
|
||||||
|
@ -1645,6 +1645,9 @@ msgstr "握手服务器"
|
|||||||
msgid "Handshake Server Port"
|
msgid "Handshake Server Port"
|
||||||
msgstr "握手服务器端口"
|
msgstr "握手服务器端口"
|
||||||
|
|
||||||
|
msgid "Override the connection destination address with the sniffed domain.<br />Otherwise use sniffed domain for routing only.<br />If using shunt nodes, configure the domain shunt rules correctly."
|
||||||
|
msgstr "用探测出的域名覆盖连接目标地址。<br />否则仅将探测得到的域名用于路由。<br />如使用分流节点,请正确设置域名分流规则。"
|
||||||
|
|
||||||
msgid "Override the connection destination address with the sniffed domain.<br />When enabled, traffic will match only by domain, ignoring IP rules.<br />If using shunt nodes, configure the domain shunt rules correctly."
|
msgid "Override the connection destination address with the sniffed domain.<br />When enabled, traffic will match only by domain, ignoring IP rules.<br />If using shunt nodes, configure the domain shunt rules correctly."
|
||||||
msgstr "用探测出的域名覆盖连接目标地址。<br />启用后仅使用域名进行流量匹配,将忽略IP规则。<br />如使用分流节点,请正确设置域名分流规则。"
|
msgstr "用探测出的域名覆盖连接目标地址。<br />启用后仅使用域名进行流量匹配,将忽略IP规则。<br />如使用分流节点,请正确设置域名分流规则。"
|
||||||
|
|
||||||
|
@ -166,7 +166,7 @@ if has_xray then
|
|||||||
|
|
||||||
o = s_xray:option(Flag, "sniffing_override_dest", translate("Override the connection destination address"))
|
o = s_xray:option(Flag, "sniffing_override_dest", translate("Override the connection destination address"))
|
||||||
o.default = 0
|
o.default = 0
|
||||||
o.description = translate("Override the connection destination address with the sniffed domain.<br />When enabled, traffic will match only by domain, ignoring IP rules.<br />If using shunt nodes, configure the domain shunt rules correctly.")
|
o.description = translate("Override the connection destination address with the sniffed domain.<br />Otherwise use sniffed domain for routing only.<br />If using shunt nodes, configure the domain shunt rules correctly.")
|
||||||
|
|
||||||
o = s_xray:option(Flag, "route_only", translate("Sniffing Route Only"))
|
o = s_xray:option(Flag, "route_only", translate("Sniffing Route Only"))
|
||||||
o.default = 0
|
o.default = 0
|
||||||
|
@ -612,8 +612,15 @@ function gen_config(var)
|
|||||||
port = tonumber(local_socks_port),
|
port = tonumber(local_socks_port),
|
||||||
protocol = "socks",
|
protocol = "socks",
|
||||||
settings = {auth = "noauth", udp = true},
|
settings = {auth = "noauth", udp = true},
|
||||||
sniffing = {enabled = true, destOverride = {"http", "tls", "quic"}}
|
sniffing = {
|
||||||
|
enabled = xray_settings.sniffing_override_dest == "1" or node.protocol == "_shunt"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
if inbound.sniffing.enabled == true then
|
||||||
|
inbound.sniffing.destOverride = {"http", "tls", "quic"}
|
||||||
|
inbound.sniffing.routeOnly = xray_settings.sniffing_override_dest ~= "1" or nil
|
||||||
|
inbound.sniffing.domainsExcluded = xray_settings.sniffing_override_dest == "1" and get_domain_excluded() or nil
|
||||||
|
end
|
||||||
if local_socks_username and local_socks_password and local_socks_username ~= "" and local_socks_password ~= "" then
|
if local_socks_username and local_socks_password and local_socks_username ~= "" and local_socks_password ~= "" then
|
||||||
inbound.settings.auth = "password"
|
inbound.settings.auth = "password"
|
||||||
inbound.settings.accounts = {
|
inbound.settings.accounts = {
|
||||||
@ -651,13 +658,16 @@ function gen_config(var)
|
|||||||
settings = {network = "tcp,udp", followRedirect = true},
|
settings = {network = "tcp,udp", followRedirect = true},
|
||||||
streamSettings = {sockopt = {tproxy = "tproxy"}},
|
streamSettings = {sockopt = {tproxy = "tproxy"}},
|
||||||
sniffing = {
|
sniffing = {
|
||||||
enabled = xray_settings.sniffing_override_dest == "1" or node.protocol == "_shunt",
|
enabled = xray_settings.sniffing_override_dest == "1" or node.protocol == "_shunt"
|
||||||
destOverride = {"http", "tls", "quic", (remote_dns_fake) and "fakedns"},
|
|
||||||
metadataOnly = false,
|
|
||||||
routeOnly = node.protocol == "_shunt" and xray_settings.sniffing_override_dest ~= "1" or nil,
|
|
||||||
domainsExcluded = xray_settings.sniffing_override_dest == "1" and get_domain_excluded() or nil
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if inbound.sniffing.enabled == true then
|
||||||
|
inbound.sniffing.destOverride = {"http", "tls", "quic", (remote_dns_fake) and "fakedns"}
|
||||||
|
inbound.sniffing.metadataOnly = false
|
||||||
|
inbound.sniffing.routeOnly = xray_settings.sniffing_override_dest ~= "1" or nil
|
||||||
|
inbound.sniffing.domainsExcluded = xray_settings.sniffing_override_dest == "1" and get_domain_excluded() or nil
|
||||||
|
end
|
||||||
|
|
||||||
local tcp_inbound = api.clone(inbound)
|
local tcp_inbound = api.clone(inbound)
|
||||||
tcp_inbound.tag = "tcp_redir"
|
tcp_inbound.tag = "tcp_redir"
|
||||||
tcp_inbound.settings.network = "tcp"
|
tcp_inbound.settings.network = "tcp"
|
||||||
|
@ -1486,6 +1486,9 @@ msgstr "Sing-Box 会在启动时自动下载资源文件,您可以使用此功
|
|||||||
msgid "Override the connection destination address"
|
msgid "Override the connection destination address"
|
||||||
msgstr "覆盖连接目标地址"
|
msgstr "覆盖连接目标地址"
|
||||||
|
|
||||||
|
msgid "Override the connection destination address with the sniffed domain.<br />Otherwise use sniffed domain for routing only.<br />If using shunt nodes, configure the domain shunt rules correctly."
|
||||||
|
msgstr "用探测出的域名覆盖连接目标地址。<br />否则仅将探测得到的域名用于路由。<br />如使用分流节点,请正确设置域名分流规则。"
|
||||||
|
|
||||||
msgid "Override the connection destination address with the sniffed domain.<br />When enabled, traffic will match only by domain, ignoring IP rules.<br />If using shunt nodes, configure the domain shunt rules correctly."
|
msgid "Override the connection destination address with the sniffed domain.<br />When enabled, traffic will match only by domain, ignoring IP rules.<br />If using shunt nodes, configure the domain shunt rules correctly."
|
||||||
msgstr "用探测出的域名覆盖连接目标地址。<br />启用后仅使用域名进行流量匹配,将忽略IP规则。<br />如使用分流节点,请正确设置域名分流规则。"
|
msgstr "用探测出的域名覆盖连接目标地址。<br />启用后仅使用域名进行流量匹配,将忽略IP规则。<br />如使用分流节点,请正确设置域名分流规则。"
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user