cuibuwei
2c6416d5ae
chore: fix some typos in comments
...
Signed-off-by: cuibuwei <cuibuwei@gmail.com>
2024-04-13 19:56:31 +08:00
Xiaotong Liu
49e3570c2c
Support server refresh concurrency ( #2537 )
...
* simultaneously refresh all servers
* Add `cert_refresh_concurrency`
---------
Co-authored-by: YX Hao <lifenjoiner@163.com>
2023-12-18 19:25:54 +08:00
Frank Denis
8bea679e7b
Unofficially support DoH/ODoH over HTTP
2023-09-05 22:37:11 +02:00
Frank Denis
16b2c84147
Tone down some errors
2023-06-24 22:38:59 +02:00
Carlo Teubner
b46775ae0c
Add some missing error checks ( #2420 )
...
I found these with the 'errcheck' tool (via 'golangci-lint').
I aimed to apply reasonable judgement when deciding which errors
actually need handling, and how to handle them.
2023-06-24 22:23:12 +02:00
Carlo Teubner
d8b1f4e7cd
Fix miscellaneous style issues ( #2421 )
...
Found by running: golangci-lint run --enable-all
I have only addressed the reported issues that seemed relevant to me.
2023-06-24 21:56:03 +02:00
lifenjoiner
b3318a94b7
Try dnscrypt-proxy to resolve configured hosts when ignore_system_dns ( #2204 )
2023-04-05 21:17:51 +02:00
Frank Denis
fb15535282
Format
2023-02-02 20:10:49 +01:00
lifenjoiner
4881186dcf
Optimize adopted relay name to show ( #2188 )
...
* Optimize adopted relay name to show
DNSCrypt relay requires ServerAddrStr;
ODoH relay requires ProviderName, port 443 can be either present or not;
raw stamp can be both.
Displaying specified stamp makes it easier to debug.
* Fix pasto
2022-08-25 19:28:04 +02:00
Frank Denis
41f192a907
Mention HTTP/3
2022-08-24 17:35:34 +02:00
Frank Denis
937c1e63e2
Revert "xtransport layer to netip and immediate dependencies ( #2159 )"
...
This reverts commit baee50f1dc
.
2022-08-10 22:24:36 +02:00
Ian Bashford
baee50f1dc
xtransport layer to netip and immediate dependencies ( #2159 )
2022-08-01 22:31:12 +02:00
Frank Denis
59ce17e0ab
No need to warn if this is then going to be an error
2022-06-24 15:41:05 +02:00
lifenjoiner
72a602577a
Raise error for invalid relay ( #2128 )
...
* Raise error for invalid relay
* Keep error messages the same
* Distinguish this from validation failed
2022-06-15 13:16:06 +02:00
lifenjoiner
0a0b69d93d
RUnlock for early exit ( #2127 )
2022-06-14 14:25:52 +02:00
lifenjoiner
6916c047e1
Use registeredServers slice copy during ServerInfo refreshing period ( #2125 )
...
goroutines:
proxy.updateRegisteredServers() versus proxy.serversInfo.refresh(proxy)
2022-06-13 17:51:33 +02:00
livingentity
74fb5dabb9
fix negative rtt / shorten lines ( #2118 )
...
* fix negative rtt / shorten lines
* Update serversInfo.go
2022-05-18 17:57:57 +02:00
livingentity
207d44323d
Update serversInfo.go ( #2092 )
2022-04-16 21:26:38 +02:00
Frank Denis
5fca7ea49e
Back to VividCortex/ewma
2022-04-05 14:04:26 +02:00
Frank Denis
66f019d886
Revert "regression: fix ewma warmup again ( #2079 )"
...
This reverts commit f67e9cab32
.
2022-04-03 23:01:03 +02:00
livingentity
f67e9cab32
regression: fix ewma warmup again ( #2079 )
...
* Update estimators.go
* Update go.mod
* Update modules.txt
* Update go.sum
* Update serversInfo.go
* Update estimators.go
* Update serversInfo.go
2022-04-02 17:41:36 +02:00
Frank Denis
df3fb0c9f8
Keep lines short
...
$ golines -w -m 120 --shorten-comments .
2022-03-23 17:48:48 +01:00
Frank Denis
034d3bd424
Switch to lifenjoiner's ewma variant
2022-02-21 09:14:24 +01:00
Frank Denis
cb140673fa
Set the number of warmup samples to 1 for the RTT estimator
2022-02-20 23:38:42 +01:00
Frank Denis
7956ba5b10
Switch to an ewma fork that allows setting the warmup samples #
2022-02-20 23:38:06 +01:00
livingentity
9ec8a35468
restore old logic/constants ( #2045 )
...
* fix indices
* Update serversInfo.go
For safety go back to former logic, just generalized for lbStrategy, until someone comes up with an actual improvement.
* restore old logic/constants
2022-02-19 17:55:36 +01:00
livingentity
ac6abfb985
LBStrategy-aware estimator ( #2043 )
...
* fix estimator
* LBStrategy-aware estimator
* typo
* cosmetics
2022-02-15 20:17:48 +01:00
Frank Denis
06733f57ed
If a relay has multiple names, print the one matching the protocol
...
Fixes #1992
2022-01-17 19:43:12 +01:00
Frank Denis
0f00cd27f9
DoH/ODoH: strip optional port number when caching a hostname
...
Fixes #1861
2021-09-06 12:02:56 +02:00
Frank Denis
b4a073f54f
Typo
2021-08-03 11:24:16 +02:00
Frank Denis
a85a003d2b
Filter relays by compatible type before selecting them
...
Fixes #1739
2021-06-08 10:52:06 +02:00
Frank Denis
5a9a6467df
Correctly check for empty/wrong relays
2021-06-08 10:27:03 +02:00
Frank Denis
ec581597a2
Require ODoH relays to be present
...
ODoH target stamps don't include certificate hashes; they are not
meant to be used directly.
2021-06-08 10:19:02 +02:00
Frank Denis
45d3afc8f9
Call ObliviousDoHQuery() on the initial test
2021-06-07 17:32:34 +02:00
Frank Denis
e7f017c592
ODoH: try POST first, even without a relay
2021-06-07 17:19:56 +02:00
Frank Denis
083fa0ad3c
Add an extra retry since ODoH servers are currently unstable
2021-06-07 13:49:37 +02:00
Frank Denis
f5a69c3bdc
Reduce delay
2021-06-07 13:46:44 +02:00
Frank Denis
9e96bbc20b
Continue, don't return
2021-06-07 13:44:08 +02:00
Frank Denis
a181a23263
Send a dummy initial query before RTT measurement in ODoH
2021-06-07 13:42:33 +02:00
Frank Denis
7980af6f46
Error propagation
2021-06-07 12:38:36 +02:00
Frank Denis
94151f9f96
Use ODoH relays in probes
2021-06-07 12:23:26 +02:00
Frank Denis
a11da2d4fb
ODoH: check certificate hashes
2021-06-07 12:09:27 +02:00
Frank Denis
b35e27bd51
Shuffle ODoH target configs and use different NX queries
2021-06-07 12:05:42 +02:00
Frank Denis
4a4f69edb7
ODoH: only store working configurations
...
Actually, we only store the first one right now.
We should at least randomize them.
2021-06-07 12:02:21 +02:00
Frank Denis
96b05e57ca
Preliminary propoer ODoH initialization
2021-06-07 11:47:11 +02:00
Frank Denis
0d81fa2796
Remove doh_client_x509_auth stuf from fetchServerInfo
...
It doesn't belong there, and that feature doesn't do what it's
documented to do. It sets client certificates globally instead of
doing it per server.
2021-06-07 11:23:48 +02:00
Frank Denis
402860e2a6
ODoH broke DNSCrypt relays with wildcards - repair
2021-06-07 11:06:41 +02:00
Frank Denis
cd45f64c18
ODoH: until relay auto selection is implemented, pick random ones
2021-06-07 11:00:21 +02:00
Frank Denis
27a82c54c8
ODoH: handle relay IP addresses
2021-06-07 10:46:01 +02:00
Frank Denis
dce4db4c86
Construct net.URL directly
2021-06-07 10:08:55 +02:00