From c02e84ead2950319c2e1021b4434acec254f702b Mon Sep 17 00:00:00 2001 From: juewuy Date: Sun, 30 Nov 2025 22:32:39 +0800 Subject: [PATCH] =?UTF-8?q?~singbox1.13=E7=89=88=E6=9C=AC=E5=86=85?= =?UTF-8?q?=E6=A0=B8=E9=80=82=E9=85=8D=E6=97=A7=E7=89=88=E9=85=8D=E7=BD=AE?= =?UTF-8?q?=E6=96=87=E4=BB=B6?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- scripts/menu.sh | 2 +- scripts/start.sh | 2 ++ scripts/webget.sh | 1 + 3 files changed, 4 insertions(+), 1 deletion(-) diff --git a/scripts/menu.sh b/scripts/menu.sh index 5feb4d3..8b6ea1a 100644 --- a/scripts/menu.sh +++ b/scripts/menu.sh @@ -95,7 +95,7 @@ ckstatus() { #检测系统端口占用 checkport fi - corename=$(echo $crashcore | sed 's/singbox/SingBox/' | sed 's/clash/Clash/' | sed 's/meta/Mihomo/') + corename=$(echo $crashcore | sed 's/singboxr/SingBoxR/' | sed 's/singbox/SingBox/' | sed 's/clash/Clash/' | sed 's/meta/Mihomo/') [ "$firewall_area" = 5 ] && corename='转发' [ -f ${TMPDIR}/debug.log -o -f ${CRASHDIR}/debug.log -a -n "$PID" ] && auto="\033[33m并处于debug状态!\033[0m" #输出状态 diff --git a/scripts/start.sh b/scripts/start.sh index f7b8ba6..8b61146 100644 --- a/scripts/start.sh +++ b/scripts/start.sh @@ -1203,6 +1203,8 @@ EOF [ ! -s "$TMPDIR"/jsons/cust_add_rules.json ] && rm -rf "$TMPDIR"/jsons/cust_add_rules.json } #提取配置文件以获得outbounds.json,providers.json及route.json + sed -i 's/^.*"inbounds":/{"inbounds":/' $core_config #删除旧版不支持的内容 + sed -i 's/,{[^{}]*"dns-out"[^{}]*}//g' $core_config "$TMPDIR"/CrashCore format -c $core_config >"$TMPDIR"/format.json echo '{' >"$TMPDIR"/jsons/outbounds.json echo '{' >"$TMPDIR"/jsons/route.json diff --git a/scripts/webget.sh b/scripts/webget.sh index ccfe4c9..b28c2e8 100644 --- a/scripts/webget.sh +++ b/scripts/webget.sh @@ -986,6 +986,7 @@ set_core_config_link(){ #直接导入配置 echo ----------------------------------------------- echo -e "注意:\033[31m此功能不兼容“跳过证书验证”功能,部分老旧\n设备可能出现x509报错导致节点不通\033[0m" echo -e "你也可以搭配在线订阅转换网站或者自建SubStore使用" + echo "$crashcore" | grep -q 'singbox' &&echo -e "singbox内核建议使用\033[32;4mhttps://subv.jwsc.eu.org/\033[0m转换" echo ----------------------------------------------- echo -e "\033[33m0 返回上级菜单\033[0m" echo -----------------------------------------------