Commit Graph

23 Commits

Author SHA1 Message Date
klzgrad
ae008e80f0 socket: Force tunneling for all sockets
In the socket system, only WebSocket sockets are allowed to tunnel
through HTTP/1 proxies. "Raw" sockets in the normal socket pool don't
have it, and their CONNECT headers are not sent, instead the raw
payload is sent as-is to the HTTP/1 proxy, breaking the proxying.

The socket system works like this:

- HTTP sockets via HTTP/1 proxies: normal pool, no tunneling.
- HTTPS sockets via HTTP/1 proxies: normal pool, no tunneling,
  but does its own proxy encapsulation.
- WS sockets via HTTP/1 proxies: WS pool, tunneling.

In Naive, we need the normal pool because the WS pool has some extra
restrictions but we also need tunneling to produce a client socket
with proxy tunneling built in.

Therefore force tunneling for all sockets and have them always send
CONNECT headers. This will otherwise break regular HTTP client sockets
via HTTP/1 proxies, but as we don't use this combination, it is ok.
2022-05-29 19:19:20 +08:00
klzgrad
55a1cccabd socket: Allow higher limits for proxies
As an intermediary proxy we should not enforce stricter connection
limits in addition to what the user is already enforcing.
2022-05-29 19:19:20 +08:00
klzgrad
9ac0473bb7 socket: Add RawConnect method 2022-05-29 19:19:20 +08:00
klzgrad
fcad6532a3 cert: Handle AIA response in PKCS#7 format 2022-05-29 19:19:20 +08:00
klzgrad
d1c65ef2ae cert: Use builtin verifier on Android and Linux 2022-05-29 19:19:20 +08:00
klzgrad
fe49f9f32d cert: Add SystemTrustStoreStaticUnix
It reads CA certificates from:

* The file in environment variable SSL_CERT_FILE
* The first available file of

/etc/ssl/certs/ca-certificates.crt (Debian/Ubuntu/Gentoo etc.)
/etc/pki/tls/certs/ca-bundle.crt (Fedora/RHEL 6)
/etc/ssl/ca-bundle.pem (OpenSUSE)
/etc/pki/tls/cacert.pem (OpenELEC)
/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem (CentOS/RHEL 7)
/etc/ssl/cert.pem (Alpine Linux)

* Files in the directory of environment variable SSL_CERT_DIR
* Files in the first available directory of

/etc/ssl/certs (SLES10/SLES11, https://golang.org/issue/12139)
/etc/pki/tls/certs (Fedora/RHEL)
/system/etc/security/cacerts (Android)
2022-05-29 19:19:20 +08:00
klzgrad
0b832a6fb1 libc++: Guard C++20 atomic type aliases
https://reviews.llvm.org/D75183
https://github.com/ziglang/zig/issues/6573
2022-05-29 19:19:20 +08:00
klzgrad
8fecbfc8f9 libc++: Disable exceptions and RTTI
Except on Mac, where exceptions are required.
And except on Android, where rtti is required.
2022-05-29 19:19:20 +08:00
klzgrad
88a37b6260 url: Remove perfetto tracing 2022-05-29 19:19:20 +08:00
klzgrad
872a47bfe4 base: Disable trace event
This allows builds with enable_base_tracing=false.
2022-05-29 19:19:20 +08:00
klzgrad
6f4529a13f lss: Avoid naming conflict in fstatat64
Supports OpenWrt builds.
2022-05-29 19:19:20 +08:00
klzgrad
8aab6590db base: Fix iwyu in file_path.cc 2022-05-29 19:19:20 +08:00
klzgrad
efc9c0a347 base: Don't fix Y2038 problem with icu 2022-05-29 19:17:46 +08:00
klzgrad
688822f794 net, url: Remove icu 2022-05-29 19:17:46 +08:00
klzgrad
d21c8bda67 build: Force determinism in official build
Helps build with ccache.
2022-05-29 19:17:46 +08:00
klzgrad
53dfc860ad build: Disable Android java templates 2022-05-29 19:17:46 +08:00
klzgrad
0c9fe9e576 build: Disable build_with_chromium
The argument build_with_chromium mainly enables various tests,
data bundling, infra integration, and AFDO profiles.

AFDO can be added by other arguments.
2022-05-29 19:17:46 +08:00
klzgrad
cf857b77c7 base: Remove JNI function on Android 2022-05-29 19:17:46 +08:00
klzgrad
a3050283f8 base: Add Android stubs 2022-05-29 19:17:46 +08:00
klzgrad
8068192907 net: Add Android stubs 2022-05-29 18:15:27 +08:00
klzgrad
4414b165f5 build: Remove tests and minimize 2022-05-29 18:15:26 +08:00
klzgrad
3e0c4f9475 Add .gitignore 2022-05-29 18:11:59 +08:00
importer
b97fdd39a5 Import chromium-102.0.5005.61 2022-05-29 18:11:59 +08:00