diff --git a/backend/internal/service/account_test_service.go b/backend/internal/service/account_test_service.go index e6c1cf4c..95fad9a6 100644 --- a/backend/internal/service/account_test_service.go +++ b/backend/internal/service/account_test_service.go @@ -781,9 +781,9 @@ func parseSoraRemainingSummary(body []byte) string { func (s *AccountTestService) shouldEnableSoraTLSFingerprint() bool { if s == nil || s.cfg == nil { - return false + return true } - return s.cfg.Gateway.TLSFingerprint.Enabled && !s.cfg.Sora.Client.DisableTLSFingerprint + return !s.cfg.Sora.Client.DisableTLSFingerprint } func isCloudflareChallengeResponse(statusCode int, body []byte) bool { diff --git a/backend/internal/service/sora_client.go b/backend/internal/service/sora_client.go index 38c1b3cc..23d93386 100644 --- a/backend/internal/service/sora_client.go +++ b/backend/internal/service/sora_client.go @@ -1101,7 +1101,10 @@ func shouldAttemptSoraTokenRecover(statusCode int, rawURL string) bool { } func (c *SoraDirectClient) doHTTP(req *http.Request, proxyURL string, account *Account) (*http.Response, error) { - enableTLS := c != nil && c.cfg != nil && c.cfg.Gateway.TLSFingerprint.Enabled && !c.cfg.Sora.Client.DisableTLSFingerprint + enableTLS := true + if c != nil && c.cfg != nil && c.cfg.Sora.Client.DisableTLSFingerprint { + enableTLS = false + } if c.httpUpstream != nil { accountID := int64(0) accountConcurrency := 0