mirror of
https://github.com/MHSanaei/3x-ui.git
synced 2026-04-16 20:45:50 +00:00
1. **Fixed XPadding Placement Dropdown**: - Added the missing `cookie` and `query` options to `xPaddingPlacement` (`stream_xhttp.html`). - *Why:* Previously, users wanting `cookie` obfuscation were forced to use the `header` placement string. This caused Xray-core to blindly intercept the entire monolithic HTTP Cookie header, failing internal padding-length validations and causing the inbound to silently drop the connection. 2. **Fixed Uplink Data Placement Validation**: - Replaced the unsupported `query` option with `cookie` in `uplinkDataPlacement`. - *Why:* Xray-core's `transport_internet.go` explicitly forbids `query` as an uplink placement option. Selecting it from the UI previously sent a payload that would cause Xray-core to instantly throw an `unsupported uplink data placement: query` panic. Adding `cookie` perfectly aligns the UI with Xray-core restrictions. ### Related Issues - Resolves #3992
19 lines
596 B
Protocol Buffer
19 lines
596 B
Protocol Buffer
syntax = "proto3";
|
|
|
|
package xray.proxy.vmess;
|
|
option csharp_namespace = "Xray.Proxy.Vmess";
|
|
option go_package = "github.com/xtls/xray-core/proxy/vmess";
|
|
option java_package = "com.xray.proxy.vmess";
|
|
option java_multiple_files = true;
|
|
|
|
import "common/protocol/headers.proto";
|
|
|
|
message Account {
|
|
// ID of the account, in the form of a UUID, e.g.,
|
|
// "66ad4540-b58c-4ad2-9926-ea63445a9b57".
|
|
string id = 1;
|
|
// Security settings. Only applies to client side.
|
|
xray.common.protocol.SecurityConfig security_settings = 3;
|
|
// Define tests enabled for this account
|
|
string tests_enabled = 4;
|
|
}
|