mirror of
https://github.com/MHSanaei/3x-ui.git
synced 2026-04-16 12:35:54 +00:00
1. **Fixed XPadding Placement Dropdown**: - Added the missing `cookie` and `query` options to `xPaddingPlacement` (`stream_xhttp.html`). - *Why:* Previously, users wanting `cookie` obfuscation were forced to use the `header` placement string. This caused Xray-core to blindly intercept the entire monolithic HTTP Cookie header, failing internal padding-length validations and causing the inbound to silently drop the connection. 2. **Fixed Uplink Data Placement Validation**: - Replaced the unsupported `query` option with `cookie` in `uplinkDataPlacement`. - *Why:* Xray-core's `transport_internet.go` explicitly forbids `query` as an uplink placement option. Selecting it from the UI previously sent a payload that would cause Xray-core to instantly throw an `unsupported uplink data placement: query` panic. Adding `cookie` perfectly aligns the UI with Xray-core restrictions. ### Related Issues - Resolves #3992
46 lines
865 B
Go
46 lines
865 B
Go
//go:build !windows && !wasm && !illumos && !openbsd
|
|
// +build !windows,!wasm,!illumos,!openbsd
|
|
|
|
package buf
|
|
|
|
import (
|
|
"syscall"
|
|
"unsafe"
|
|
)
|
|
|
|
type posixReader struct {
|
|
iovecs []syscall.Iovec
|
|
}
|
|
|
|
func (r *posixReader) Init(bs []*Buffer) {
|
|
iovecs := r.iovecs
|
|
if iovecs == nil {
|
|
iovecs = make([]syscall.Iovec, 0, len(bs))
|
|
}
|
|
for idx, b := range bs {
|
|
iovecs = append(iovecs, syscall.Iovec{
|
|
Base: &(b.v[0]),
|
|
})
|
|
iovecs[idx].SetLen(int(Size))
|
|
}
|
|
r.iovecs = iovecs
|
|
}
|
|
|
|
func (r *posixReader) Read(fd uintptr) int32 {
|
|
n, _, e := syscall.Syscall(syscall.SYS_READV, fd, uintptr(unsafe.Pointer(&r.iovecs[0])), uintptr(len(r.iovecs)))
|
|
if e != 0 {
|
|
return -1
|
|
}
|
|
return int32(n)
|
|
}
|
|
|
|
func (r *posixReader) Clear() {
|
|
for idx := range r.iovecs {
|
|
r.iovecs[idx].Base = nil
|
|
}
|
|
r.iovecs = r.iovecs[:0]
|
|
}
|
|
|
|
func newMultiReader() multiReader {
|
|
return &posixReader{}
|
|
}
|