Skip to content

Commit

Permalink
chore: fix typo
Browse files Browse the repository at this point in the history
  • Loading branch information
vernesong committed Jan 4, 2024
1 parent 006ff76 commit aaaab0b
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 4 deletions.
11 changes: 10 additions & 1 deletion luci-app-openclash/po/zh-cn/openclash.zh-cn.po
Original file line number Diff line number Diff line change
Expand Up @@ -3463,4 +3463,13 @@ msgid "Used for Downloading Subscriptions, Defaults to Clash"
msgstr "用于下载订阅时指定 UA,默认为 Clash"

msgid "Error: Set Proxies Address Skip Failed,"
msgstr "错误:绕过代理服务器地址设置失败,"
msgstr "错误:绕过代理服务器地址设置失败,"

msgid "Flush Failed"
msgstr "清理失败"

msgid "Flush Successful"
msgstr "清理成功"

msgid "Flush Timeout"
msgstr "清理超时"
Original file line number Diff line number Diff line change
Expand Up @@ -37,9 +37,9 @@ check_dnsmasq() {
if [ -z "$DNSPORT" ]; then
DNSPORT=$(netstat -nlp |grep -E '127.0.0.1:.*dnsmasq' |awk -F '127.0.0.1:' '{print $2}' |awk '{print $1}' |head -1 || echo 53)
fi
if [ "$(nslookup www.baidu.com 127.0.0.1:12353 >/dev/null 2>&1 || echo $?)" = "1" ]; then
if [ "$(nslookup www.baidu.com 127.0.0.1:"$DNSPORT" >/dev/null 2>&1 || echo $?)" = "1" ]; then
if [ -n "$FW4" ]; then
if [ -z "$(nft list chain inet fw4 nat_output |grep 'OpenClash DNS Hijack')" ]; then
if [ -z "$(nft list chain inet fw4 nat_output |grep '12353')" ]; then
nft insert rule inet fw4 dstnat position 0 tcp dport 53 counter redirect to "$dns_port" comment \"OpenClash DNS Hijack\" 2>/dev/null
nft insert rule inet fw4 dstnat position 0 udp dport 53 counter redirect to "$dns_port" comment \"OpenClash DNS Hijack\" 2>/dev/null
nft 'add chain inet fw4 nat_output { type nat hook output priority -1; }' 2>/dev/null
Expand All @@ -58,7 +58,7 @@ check_dnsmasq() {
fi
fi
else
if [ -z "$(iptables -t nat -nL OUTPUT --line-number |grep 'OpenClash DNS Hijack')" ]; then
if [ -z "$(iptables -t nat -nL OUTPUT --line-number |grep '12353')" ]; then
iptables -t nat -I PREROUTING -p udp --dport 53 -j REDIRECT --to-ports "$dns_port" -m comment --comment "OpenClash DNS Hijack" 2>/dev/null
iptables -t nat -I PREROUTING -p tcp --dport 53 -j REDIRECT --to-ports "$dns_port" -m comment --comment "OpenClash DNS Hijack" 2>/dev/null
iptables -t nat -I OUTPUT -p udp --dport 53 -m owner ! --uid-owner 65534 -j REDIRECT --to-ports "$dns_port" -m comment --comment "OpenClash DNS Hijack" 2>/dev/null
Expand Down

0 comments on commit aaaab0b

Please sign in to comment.