Bladeren bron

fix: styles and store version number

Yifei Zhang 2 jaren geleden
bovenliggende
commit
76db385d6d
6 gewijzigde bestanden met toevoegingen van 52 en 249 verwijderingen
  1. 10 8
      app/components/home.module.scss
  2. 14 12
      app/components/settings.tsx
  3. 1 0
      app/store.ts
  4. 5 1
      app/styles/globals.scss
  5. 0 228
      scripts/proxychains.conf
  6. 22 0
      static/icon.svg

+ 10 - 8
app/components/home.module.scss

@@ -23,17 +23,19 @@
   @include container();
 }
 
-.tight-container {
-  --window-width: 100vw;
-  --window-height: 100vh;
-  --window-content-width: calc(100% - var(--sidebar-width));
+@media only screen and (min-width: 600px) {
+  .tight-container {
+    --window-width: 100vw;
+    --window-height: 100vh;
+    --window-content-width: calc(100% - var(--sidebar-width));
 
-  @include container();
+    @include container();
 
-  max-width: 100vw;
-  max-height: 100vh;
+    max-width: 100vw;
+    max-height: 100vh;
 
-  border-radius: 0;
+    border-radius: 0;
+  }
 }
 
 .sidebar {

+ 14 - 12
app/components/settings.tsx

@@ -147,18 +147,6 @@ export function Settings(props: { closeSettings: () => void }) {
             </select>
           </ListItem>
 
-          <SettingItem title={Locale.Settings.TightBorder}>
-            <input
-              type="checkbox"
-              checked={config.tightBorder}
-              onChange={(e) =>
-                updateConfig(
-                  (config) => (config.tightBorder = e.currentTarget.checked)
-                )
-              }
-            ></input>
-          </SettingItem>
-
           <SettingItem title={Locale.Settings.Lang.Name}>
             <div className="">
               <select
@@ -177,6 +165,20 @@ export function Settings(props: { closeSettings: () => void }) {
               </select>
             </div>
           </SettingItem>
+
+          <div className="no-mobile">
+            <SettingItem title={Locale.Settings.TightBorder}>
+              <input
+                type="checkbox"
+                checked={config.tightBorder}
+                onChange={(e) =>
+                  updateConfig(
+                    (config) => (config.tightBorder = e.currentTarget.checked)
+                  )
+                }
+              ></input>
+            </SettingItem>
+          </div>
         </List>
         <List>
           <SettingItem

+ 1 - 0
app/store.ts

@@ -451,6 +451,7 @@ export const useChatStore = create<ChatStore>()(
     }),
     {
       name: LOCAL_KEY,
+      version: 1,
     }
   )
 );

+ 5 - 1
app/styles/globals.scss

@@ -60,6 +60,10 @@
     --window-content-width: var(--window-width);
     --message-max-width: 100%;
   }
+
+  .no-mobile {
+    display: none;
+  }
 }
 
 @media (prefers-color-scheme: dark) {
@@ -187,4 +191,4 @@ div.math {
   display: flex;
   align-items: center;
   justify-content: center;
-}
+}

+ 0 - 228
scripts/proxychains.conf

@@ -1,228 +0,0 @@
-# proxychains.conf  FOR PROXYCHAINS.EXE ALPHA
-#
-#        SOCKS5 tunneling proxifier with Fake DNS.
-#	
-
-# The option below identifies how the ProxyList is treated.
-# only one option should be uncommented at time,
-# otherwise the last appearing option will be accepted
-#
-#
-# DYNAMIC_CHAIN IS NOT SUPPORTED AT PRESENT
-#dynamic_chain
-# DYNAMIC_CHAIN IS NOT SUPPORTED AT PRESENT
-#
-# Dynamic - Each connection will be done via chained proxies
-# all proxies chained in the order as they appear in the list
-# at least one proxy must be online to play in chain
-# (dead proxies are skipped)
-# otherwise EINTR is returned to the app
-# 
-#
-strict_chain
-#
-# Strict - Each connection will be done via chained proxies
-# all proxies chained in the order as they appear in the list
-# all proxies must be online to play in chain
-# otherwise EINTR is returned to the app
-#
-# RANDOM_CHAIN IS NOT SUPPORTED AT PRESENT
-#random_chain
-# RANDOM_CHAIN IS NOT SUPPORTED AT PRESENT
-#
-# Random - Each connection will be done via random proxy
-# (or proxy chain, see  chain_len) from the list.
-# this option is good to test your IDS :)
-
-# Make sense only if random_chain
-#chain_len = 2
-
-# Quiet mode (no output from library)
-#quiet_mode
-
-# Proxy DNS requests using Fake IP - no leak for DNS data
-proxy_dns
-
-# Proxy DNS requests using UDP associate feature provided by SOCKS5 proxy
-# NOT SUPPORTED AT PRESENT
-#proxy_dns_udp_associate
-# NOT SUPPORTED AT PRESENT
-
-# set the class A subnet number to usefor use of the internal remote DNS mapping
-# we use the reserved 224.x.x.x range by default,
-# if the proxified app does a DNS request, we will return an IP from that range.
-# on further accesses to this ip we will send the saved DNS name to the proxy.
-# in case some control-freak app checks the returned ip, and denies to 
-# connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x.
-# of course you should make sure that the proxified app does not need
-# *real* access to this subnet. 
-# i.e. dont use the same subnet then in the localnet section
-#remote_dns_subnet 127 
-#remote_dns_subnet 10
-remote_dns_subnet 224
-
-# This enables you to set a CIDR block for the internal remote DNS mapping
-# for example, remote_dns_subnet_cidr_v4 224.0.0.0/8 is equivalent to
-# remote_dns_subnet 224.
-# subnet mask format like 255.255.0.0 is not allowed here
-# By default 224.0.0.0/8 and 250d::/16
-#remote_dns_subnet_cidr_v4 224.0.0.0/8
-#remote_dns_subnet_cidr_v6 250d::/16
-
-# Some timeouts in milliseconds
-# Defaults: tcp_read_time_out 5000, tcp_connect_time_out 3000
-#tcp_read_time_out 15000
-#tcp_connect_time_out 8000
-
-
-# ==== Rules ====
-# You can control which IP range not to be proxied.
-# First matched rule decides the target (PROXIED, DIRECT or BLOCK) of a
-# connection.
-
-# localnet always has a "DIRECT" target, which means they will not be
-# proxied.
-# By default enable localnet for loopback address ranges
-# RFC5735 Loopback address range
-localnet 127.0.0.0/255.0.0.0
-# RFC1918 Private Address Ranges
-# localnet 10.0.0.0/255.0.0.0
-# localnet 172.16.0.0/255.240.0.0
-# localnet 192.168.0.0/255.255.0.0
-
-
-# Example for localnet exclusion
-## Exclude connections to 192.168.1.0/24 with port 80
-# localnet 192.168.1.0:80/255.255.255.0
-
-## Exclude connections to 192.168.100.0/24
-# localnet 192.168.100.0/255.255.255.0
-
-## Exclude connections to ANYwhere with port 80
-# localnet 0.0.0.0:80/0.0.0.0
-
-# === Additional routing rules ===
-# These rules enables further control on websites/addresses which
-# should be proxied or not.
-# All rules can have an extra optional restriction of target port.
-# However, if the proxied application uses gethostbyname() to do DNS
-# query instead of getaddrinfo() series, this port part of the rule
-# is invalidated.
-# Three target is allowed: PROXY, DIRECT and BLOCK.
-#
-# - DOMAIN-KEYWORD rule, matching requests where the FQDN contains
-#   a specific string.
-#   e.g. DOMAIN-KEYWORD,google:80,DIRECT means any request to FQDN
-#   containing "google" with the target port 80 will NOT be proxied.
-#
-# - DOMAIN-SUFFIX rule, matching requests where the FQDN is suffixed
-#   with a specific string.
-#   e.g. DOMAIN-SUFFIX,.ru,PROXY means any FQDN that ends with ".ru"
-#    will be proxied.
-#
-# - DOMAIN-FULL rule, matching requests where the FQDN is exactly
-#   identical to a specific string.
-#   e.g. DOMAIN-FULL,duckduckgo.com,DIRECT means every request to
-#   "duckduckgo.com" (must entirely match) will NOT be proxied.
-#
-# - DOMAIN rule, the alias of DOMAIN-FULL rule.
-#
-# - IP-CIDR rule, matching requests to IP address in a CIDR block.
-#   Note if an FQDN is previously matched by a DOMAIN* rule, this rule
-#   is not applied to the resolved IPs. (Because fake IPs are used in
-#   this case)
-#   e.g. IP-CIDR,8.8.8.8/32,DIRECT
-#   IP-CIDR,250e::/16,PROXY
-#   IP-CIDR,[250c::]:443/16,PROXY
-#   IP-CIDR,10.0.0.0:80/8,DIRECT
-#   Note that "IP-CIDR,127.0.0.0/8,DIRECT" is equivalent to 
-#     "localnet 127.0.0.0/255.0.0.0".
-IP-CIDR,10.0.0.0/8,DIRECT
-IP-CIDR,172.16.0.0/12,DIRECT
-IP-CIDR,192.168.0.0/255.255.0.0,DIRECT
-IP-CIDR,fe80::/8,DIRECT
-# - PORT rule, matching requests to a target port.
-#   e.g. PORT,25,BLOCK
-#
-# - FINAL "rule", deciding the destiny of a request immediately.
-#   When this "rule" is used, it is not treated as a "match".
-#   If you want an unconditional match, try other rules instead, like
-#   IP-CIDR,0.0.0.0/0,PROXY or DOMAIN-KEYWORD,,PROXY.
-#
-#   When no rules and no FINAL "rule" matched, a connection will be
-#   PROXIED by default, unless you specify option default_target.
-#   e.g. FINAL,PROXY
-
-# Will fake IP entries created by a descendant process be removed if this 
-# process exited? 1 by default.
-delete_fake_ip_after_child_exits 1
-
-# When no rules and no FINAL "rule" matched, a connection's default
-# target. PROXY by default.
-default_target PROXY
-
-# Will the rules apply to the resolved IP if corresponding hostname
-# did not match any rules? (FINAL is not counted as a rule)
-# IF SO, SET THIS OPTION'S VALUE TO 0. 1 by default.
-use_fake_ip_when_hostname_not_matched 1
-
-# ===== Keep them as-is =====
-
-map_resolved_ip_to_host 0
-search_for_host_by_resolved_ip 0
-# or force_resolve_by_hosts_file 1
-resolve_locally_if_match_hosts 1
-
-# ===== Keep them as-is - end =====
-
-# Generate fake ips by FQDN hash - 1 (better to get rid of SSH safe
-# warnings)
-# Generate fake ips sequentially - 0
-# Default: 1
-gen_fake_ip_using_hashed_hostname 1
-
-# If your *first* proxy supports connecting to it by an IPv4 address
-# (resolved by a hostname or specified manually), set its value to 1.
-# This enables proxying IPv4 address.
-# If disabled, fake IPv4 address is not returned.
-# 1 by default
-first_tunnel_uses_ipv4 1
-
-# If your *first* proxy supports connecting to it by an IPv6 address
-# (resolved by a hostname or specified manually), set its value to 1.
-# This enables proxying IPv6 address.
-# If disabled, fake IPv6 address is not returned.
-# 0 by default
-first_tunnel_uses_ipv6 0
-
-# Custom hosts file path
-#custom_hosts_file_path C:\Some Path\hosts
-#custom_hosts_file_path /etc/alternative/hosts
- 
-# Custom log level.
-#  600 - VERBOSE
-#  500 - DEBUG
-#  400 - INFO
-#  300 - WARNING
-#  200 - ERROR
-#  100 - CRITICAL
-# "log_level 200" is equivalent to "quiet_mode"
-log_level 400
-
-# ProxyList format
-#       type  host  port [user pass]
-#       (values separated by 'tab' or 'blank')
-#
-#
-#        Examples:
-#
-#            	socks5	localhost	1080
-#            	socks5	localhost	1080	user	password
-#            	socks5	192.168.67.78	1080	lamer	secret
-#		
-#
-#       proxy types: socks5
-#        ( auth types supported:  "user/pass"-socks5 )
-#
-[ProxyList]
-socks5 localhost 7890

File diff suppressed because it is too large
+ 22 - 0
static/icon.svg


Some files were not shown because too many files changed in this diff