Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

socks proxy rebase #2571

Closed
wants to merge 9 commits into from
Closed

socks proxy rebase #2571

wants to merge 9 commits into from

Conversation

ndew623
Copy link
Contributor

@ndew623 ndew623 commented Jun 7, 2017

A rebase that brings the socks_proxy branch up to date with the master branch for easier future development. And this time the base is k9mail/master and there are 6 commits, not over 1000.

jonas-lundqvist and others added 6 commits June 4, 2017 19:32
We don't want people to use this incomplete implementation believing the proxy
will be used for all their connections. This could have serious privacy
implications, e.g. when using Tor via SOCKS proxy.

See also #980
@Valodim
Copy link
Contributor

Valodim commented Jun 7, 2017

Nice work! The unit tests seem to be failing now due to a syntax error, do you want to look into this?

@ndew623
Copy link
Contributor Author

ndew623 commented Jun 8, 2017

Thanks! I believe I have solved the issue with the tests.

Copy link
Contributor

@Valodim Valodim left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is the feature flag really necessary? We don't have that complex a development community, I think we should be good building this in the debug build but not the release.

That also increases the chance that this will be dogfood tested.

public static int getPgpInlineDialogCounter() {
return sPgpInlineDialogCounter;
}


Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

unnecessary whitespace changes

@@ -203,6 +223,11 @@ public Socket createSocket(Socket socket, String host, int port, String clientCe

setSniHost(socketFactory, sslSocket, host);

if (!proxySettings.enabled && socket == null) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't understand this change, and how the socket.connect methods below are all removed. Does the method return a connected socket now, or what?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes I think it does. Because the proxied case has to return a connected socket, all the methods do. I think this is okay but the method name should indicate that this is the case.

@Valodim
Copy link
Contributor

Valodim commented Aug 22, 2017

Thanks for picking this up! I think we should try to merge this asap, to avoid collecting bitdust again. If we keep this feature flagged, it should be simple to ensure nothing breaks.

@philipwhiuk philipwhiuk mentioned this pull request Oct 12, 2017
7 tasks
@cketti
Copy link
Member

cketti commented Oct 14, 2017

The socks_proxy branch hasn't been merged because it needs additional work done. Not because it just needs rebasing. Closing this PR.

If someone wants to work on this it's probably easier to start fresh. I don't want any of the remote stores to have to know about a proxy server. We should be able to pass a Socket factory to the remote stores. All the SOCKS proxy handling code could live in the factory class.
I think Valodim is right in that we should use BuildConfig.DEBUG as feature flag.

@cketti cketti closed this Oct 14, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants