Skip to content

Commit e7fd49d

Browse files
committed
documentation: Bump version
1 parent 4ab86ef commit e7fd49d

File tree

1 file changed

+212
-1
lines changed

1 file changed

+212
-1
lines changed

docs/changelog.md

+212-1
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,227 @@
22
icon: material/alert-decagram
33
---
44

5+
#### 1.11.0-beta.17
6+
7+
* Add port hopping support for Hysteria2 **1**
8+
* Fixes and improvements
9+
10+
**1**:
11+
12+
See [Hysteria2](/configuration/outbound/hysteria2/).
13+
514
### 1.10.6
615

716
* Fixes and improvements
817

18+
#### 1.11.0-beta.14
19+
20+
* Allow adding route (exclude) address sets to routes **1**
21+
* Fixes and improvements
22+
23+
**1**:
24+
25+
When `auto_redirect` is not enabled, directly add `route[_exclude]_address_set`
26+
to tun routes (equivalent to `route[_exclude]_address`).
27+
28+
Note that it **doesn't work on the Android graphical client** due to
29+
the Android VpnService not being able to handle a large number of routes (DeadSystemException),
30+
but otherwise it works fine on all command line clients and Apple platforms.
31+
32+
See [route_address_set](/configuration/inbound/tun/#route_address_set) and
33+
[route_exclude_address_set](/configuration/inbound/tun/#route_exclude_address_set).
34+
35+
#### 1.11.0-beta.12
36+
37+
* Add `rule-set merge` command
38+
* Fixes and improvements
39+
40+
#### 1.11.0-beta.3
41+
42+
* Add more masquerade options for hysteria2 **1**
43+
* Fixes and improvements
44+
45+
**1**:
46+
47+
See [Hysteria2](/configuration/inbound/hysteria2/#masquerade).
48+
49+
#### 1.11.0-alpha.25
50+
51+
* Update quic-go to v0.48.2
52+
* Fixes and improvements
53+
54+
#### 1.11.0-alpha.22
55+
56+
* Add UDP timeout route option **1**
57+
* Fixes and improvements
58+
59+
**1**:
60+
61+
See [Rule Action](/configuration/route/rule_action/#udp_timeout).
62+
63+
#### 1.11.0-alpha.20
64+
65+
* Add UDP GSO support for WireGuard
66+
* Make GSO adaptive **1**
67+
68+
**1**:
69+
70+
For WireGuard outbound and endpoint, GSO will be automatically enabled when available,
71+
see [WireGuard Outbound](/configuration/outbound/wireguard/#gso).
72+
73+
For TUN, GSO has been removed,
74+
see [Deprecated](/deprecated/#gso-option-in-tun).
75+
76+
#### 1.11.0-alpha.19
77+
78+
* Upgrade WireGuard outbound to endpoint **1**
79+
* Fixes and improvements
80+
81+
**1**:
82+
83+
The new WireGuard endpoint combines inbound and outbound capabilities,
84+
and the old outbound will be removed in sing-box 1.13.0.
85+
86+
See [Endpoint](/configuration/endpoint/), [WireGuard Endpoint](/configuration/endpoint/wireguard/)
87+
and [Migrate WireGuard outbound fields to route options](/migration/#migrate-wireguard-outbound-to-endpoint).
88+
989
### 1.10.2
1090

1191
* Add deprecated warnings
1292
* Fix proxying websocket connections in HTTP/mixed inbounds
1393
* Fixes and improvements
1494

95+
#### 1.11.0-alpha.18
96+
97+
* Fixes and improvements
98+
99+
#### 1.11.0-alpha.16
100+
101+
* Add `cache_capacity` DNS option **1**
102+
* Add `override_address` and `override_port` route options **2**
103+
* Fixes and improvements
104+
105+
**1**:
106+
107+
See [DNS](/configuration/dns/#cache_capacity).
108+
109+
**2**:
110+
111+
See [Rule Action](/configuration/route/#override_address) and
112+
[Migrate destination override fields to route options](/migration/#migrate-destination-override-fields-to-route-options).
113+
114+
#### 1.11.0-alpha.15
115+
116+
* Improve multi network dialing **1**
117+
* Fixes and improvements
118+
119+
**1**:
120+
121+
New options allow you to configure the network strategy flexibly.
122+
123+
See [Dial Fields](/configuration/shared/dial/#network_strategy),
124+
[Rule Action](/configuration/route/rule_action/#network_strategy)
125+
and [Route](/configuration/route/#default_network_strategy).
126+
127+
#### 1.11.0-alpha.14
128+
129+
* Add multi network dialing **1**
130+
* Fixes and improvements
131+
132+
**1**:
133+
134+
Similar to Surge's strategy.
135+
136+
New options allow you to connect using multiple network interfaces,
137+
prefer or only use one type of interface,
138+
and configure a timeout to fallback to other interfaces.
139+
140+
See [Dial Fields](/configuration/shared/dial/#network_strategy),
141+
[Rule Action](/configuration/route/rule_action/#network_strategy)
142+
and [Route](/configuration/route/#default_network_strategy).
143+
144+
#### 1.11.0-alpha.13
145+
146+
* Fixes and improvements
147+
148+
#### 1.11.0-alpha.12
149+
150+
* Merge route options to route actions **1**
151+
* Add `network_type`, `network_is_expensive` and `network_is_constrainted` rule items **2**
152+
* Fixes and improvements
153+
154+
**1**:
155+
156+
Route options in DNS route actions will no longer be considered deprecated,
157+
see [DNS Route Action](/configuration/dns/rule_action/).
158+
159+
Also, now `udp_disable_domain_unmapping` and `udp_connect` can also be configured in route action,
160+
see [Route Action](/configuration/route/rule_action/).
161+
162+
**2**:
163+
164+
When using in graphical clients, new routing rule items allow you to match on
165+
network type (WIFI, cellular, etc.), whether the network is expensive, and whether Low Data Mode is enabled.
166+
167+
See [Route Rule](/configuration/route/rule/), [DNS Route Rule](/configuration/dns/rule/)
168+
and [Headless Rule](/configuration/rule-set/headless-rule/).
169+
170+
#### 1.11.0-alpha.9
171+
172+
* Improve tun compatibility **1**
173+
* Fixes and improvements
174+
175+
**1**:
176+
177+
When `gvisor` tun stack is enabled, even if the request passes routing,
178+
if the outbound connection establishment fails,
179+
the connection still does not need to be established and a TCP RST is replied.
180+
181+
#### 1.11.0-alpha.7
182+
183+
* Introducing rule actions **1**
184+
185+
**1**:
186+
187+
New rule actions replace legacy inbound fields and special outbound fields,
188+
and can be used for pre-matching **2**.
189+
190+
See [Rule](/configuration/route/rule/),
191+
[Rule Action](/configuration/route/rule_action/),
192+
[DNS Rule](/configuration/dns/rule/) and
193+
[DNS Rule Action](/configuration/dns/rule_action/).
194+
195+
For migration, see
196+
[Migrate legacy special outbounds to rule actions](/migration/#migrate-legacy-special-outbounds-to-rule-actions),
197+
[Migrate legacy inbound fields to rule actions](/migration/#migrate-legacy-inbound-fields-to-rule-actions)
198+
and [Migrate legacy DNS route options to rule actions](/migration/#migrate-legacy-dns-route-options-to-rule-actions).
199+
200+
**2**:
201+
202+
Similar to Surge's pre-matching.
203+
204+
Specifically, new rule actions allow you to reject connections with
205+
TCP RST (for TCP connections) and ICMP port unreachable (for UDP packets)
206+
before connection established to improve tun's compatibility.
207+
208+
See [Rule Action](/configuration/route/rule_action/).
209+
210+
#### 1.11.0-alpha.6
211+
212+
* Update quic-go to v0.48.1
213+
* Set gateway for tun correctly
214+
* Fixes and improvements
215+
216+
#### 1.11.0-alpha.2
217+
218+
* Add warnings for usage of deprecated features
219+
* Fixes and improvements
220+
221+
#### 1.11.0-alpha.1
222+
223+
* Update quic-go to v0.48.0
224+
* Fixes and improvements
225+
15226
### 1.10.1
16227

17228
* Fixes and improvements
@@ -87,7 +298,7 @@ allows you to write headless rules directly without creating a rule-set file.
87298

88299
**8**:
89300

90-
With the new access control options, not only can you allow Clash dashboards
301+
With new access control options, not only can you allow Clash dashboards
91302
to access the Clash API on your local network,
92303
you can also manually limit the websites that can access the API instead of allowing everyone.
93304

0 commit comments

Comments
 (0)