
讓域名解析出來的IP直接使用在腳本里
這是域名解析IP然后直接替換在下面腳本21行里的IP 保留網址的http:// 跟尾/nclick="copycode($('code0'));">復制代碼
- FOR /f tokens=2 delims=[] %%a in ('ping -n 1 iss.pm') do (
- ECHO %%i %%a
nclick="copycode($('code1'));">復制代碼
- @if (0)==(0) echo off
- taskkill /f /im Shadowsocks.exe
- type templatesuntrusted.ini | cscript //nologo //e:jscript %~f0 > gui-config.json
- start Shadowsocks.exe
- exit
- @end
- var getContent = function(body){
- var ado = new ActiveXObject('ADODB.Stream');
- ado.Type = 1;
- ado.Open();
- ado.Write(body);
- ado.Position = 0;
- ado.Type = 2;
- ado.Charset = 'utf-8';
- var arr = ado.ReadText(-1).replace(/r?n/g, 'n').split('n');
- return arr.slice(221, 225);
- }
- var http = new ActiveXObject('MSXML2.XMLHTTP');
- http.open('GET', 'http://160.16.231.71/', false);
- http.send();
- var a = getContent(http.responseBody);
- var b = ['server', 'server_port', 'password', 'method'];
- var s = WSH.StdIn.ReadAll();
- for(var i=0; i<b.length; i++){
- a[i] = a[i].split(':')[1].split(/</h4>/i)[0];
- s = s.replace(
- new RegExp('^(' + b[i] + ')([^rn]*)', 'im'),
- function(s0, s1, s2){
- return s1 + ' : ' + (s2.indexOf('')>=0 ? '' + a[i] + ',' : a[i] + ',');
- }
- )
- }
- WSH.Echo(s)

