Commit Graph

14 Commits

Author SHA1 Message Date
klzgrad
b2fcf5f5ae net/spdy: Reduce warnings about RST on invalid streams
Per RFC 7540#6.4:

  However, after sending the RST_STREAM, the sending endpoint MUST be
  prepared to receive and process additional frames sent on the stream
  that might have been sent by the peer prior to the arrival of the
  RST_STREAM.
2024-10-07 17:43:47 +08:00
klzgrad
04b98e43fd net: Allow http proxies in proxy chains 2024-10-07 17:43:47 +08:00
klzgrad
60ab619ea8 net/socket: Use SO_REUSEPORT for server sockets 2024-10-07 17:43:47 +08:00
klzgrad
26e920dc90 net/socket: Force tunneling for all sockets
In the socket system, only WebSocket sockets are allowed to tunnel
through HTTP/1 proxies. "Raw" sockets in the normal socket pool don't
have it, and their CONNECT headers are not sent, instead the raw
payload is sent as-is to the HTTP/1 proxy, breaking the proxying.

The socket system works like this:

- HTTP sockets via HTTP/1 proxies: normal pool, no tunneling.
- HTTPS sockets via HTTP/1 proxies: normal pool, no tunneling,
  but does its own proxy encapsulation.
- WS sockets via HTTP/1 proxies: WS pool, tunneling.

In Naive, we need the normal pool because the WS pool has some extra
restrictions but we also need tunneling to produce a client socket
with proxy tunneling built in.

Therefore force tunneling for all sockets and have them always send
CONNECT headers. This will otherwise break regular HTTP client sockets
via HTTP/1 proxies, but as we don't use this combination, it is ok.
2024-10-07 17:43:47 +08:00
klzgrad
7309ca8d63 net/socket: Allow higher limits for proxies
As an intermediary proxy we should not enforce stricter connection
limits in addition to what the user is already enforcing.
2024-10-07 17:43:47 +08:00
klzgrad
72b146cf70 net/cert: Fix iwyu 2024-10-07 17:43:47 +08:00
klzgrad
a82b5feb4c net/cert: Handle AIA response in PKCS#7 format 2024-10-07 17:43:47 +08:00
klzgrad
9ae0ede106 net/cert: Use builtin verifier on Android and Linux 2024-10-07 17:43:47 +08:00
klzgrad
91de5ec9c0 net/cert: Add SystemTrustStoreStaticUnix
It reads CA certificates from:

* The file in environment variable SSL_CERT_FILE
* The first available file of

/etc/ssl/certs/ca-certificates.crt (Debian/Ubuntu/Gentoo etc.)
/etc/pki/tls/certs/ca-bundle.crt (Fedora/RHEL 6)
/etc/ssl/ca-bundle.pem (OpenSUSE)
/etc/pki/tls/cacert.pem (OpenELEC)
/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem (CentOS/RHEL 7)
/etc/ssl/cert.pem (Alpine Linux)

* Files in the directory of environment variable SSL_CERT_DIR
* Files in the first available directory of

/etc/ssl/certs (SLES10/SLES11, https://golang.org/issue/12139)
/etc/pki/tls/certs (Fedora/RHEL)
/system/etc/security/cacerts (Android)
2024-10-07 17:43:47 +08:00
klzgrad
f0505df1c3 net, url: Remove icu 2024-10-07 17:43:47 +08:00
klzgrad
3abe1fe3b3 base, net: Fix disabling tracing 2024-10-07 17:43:47 +08:00
klzgrad
2e7a44d8f6 android: net: Add Android stubs 2024-10-07 15:23:47 +08:00
klzgrad
4473a1cd71 build: Remove tests and minimize 2024-10-06 12:17:28 +08:00
importer
009ee28363 Import chromium-129.0.6668.81 2024-10-06 12:16:12 +08:00