Commit Graph

58 Commits

Author SHA1 Message Date
klzgrad
9289983b1e socket: Force tunneling for all sockets
After the upstream large refactor, now only WebSocket sockets
have tunneling via HTTP/1 proxies. "Raw" sockets in the normal
socket pool don't have tunneling via HTTP/1 proxies, i.e.
CONNECT headers are not sent, instead the raw payload is sent
as-is to the HTTP/1 proxy, which makes it not work.

For the reference the official code does this:

- HTTP sockets via HTTP/1 proxies: normal pool, no tunneling.
- HTTPS sockets via HTTP/1 proxies: normal pool, no tunneling
  but does its own proxy encapsulation.
- WS sockets via HTTP/1 proxies: WS pool, tunneling.

We want the normal pool because the WS pool has some extra
restrictions but we also want tunneling to expose a client socket
with the proxy built in.

Therefore we can force tunneling for all sockets. This will always
send CONNECT headers first and thus break HTTP client sockets via
HTTP/1 proxies, but since we don't use this combination this is ok.
2020-10-09 23:24:11 +08:00
klzgrad
b9e083bf0e socket: Add RawConnect method 2020-10-09 23:24:10 +08:00
klzgrad
f4763ae9fb socket: Allow higher limits for proxies
As an intermediary proxy we should not enforce stricter connection
limits in addition to what the user is already enforcing.
2020-10-09 23:24:10 +08:00
klzgrad
24455ec682 base: Disable trace event 2020-10-09 23:24:10 +08:00
klzgrad
8eb85fd1fd build: Remove icu 2020-10-09 23:24:09 +08:00
klzgrad
ddcb717786 build: Force determinism in official build 2020-10-09 23:24:09 +08:00
klzgrad
eb8c88a2cb build: Don't depend on dri in //content/gpu 2020-10-09 23:24:09 +08:00
importer
a62173dd44 Import chromium-86.0.4240.75 2020-10-09 23:24:08 +08:00