summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Flag all final types accordinglyHEADmasterMichael Catanzaro2023-04-0617-69/+69
| | | | Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/237>
* Update Bulgarian translationglib-2-76Alexander Shopov2023-03-311-37/+17
|
* Fix misspellings of configurationDan Yeaw2023-03-181-3/+3
|
* Prepare 2.76.02.76.0Michael Catanzaro2023-03-172-1/+7
|
* proxy: Use environment-libproxy as the as-installed test for libproxySimon McVittie2023-02-121-5/+5
| | | | | | | | | | | | | | Previously the .test file was generated with a reference to ${installed_tests_dir}/environment, which is only built (from the same source code) when the module for proxy configuration from environment variables (without using libproxy) is enabled. The build-time test already correctly ran environment-libproxy. Resolves: https://gitlab.gnome.org/GNOME/glib-networking/-/issues/208 Bug-Debian: https://bugs.debian.org/1031166 Signed-off-by: Simon McVittie <smcv@debian.org> Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/235>
* Do not add SSL session to the OpenSSL internal cacheGoncalo Gomes2023-02-101-2/+0
| | | | | | | | | | | | | When SSL session caching is handled externally, explicitly adding the SSL session to the OpenSSL internal session cache may cause the session to become unresumable. When attempting to reuse an unresumable session from the external cache, OpenSSL will automatically create a new one which results in a full handshake being performed. This commit removes the explicit call to SSL_CTX_add_session() as the call to SSL_add_session() is sufficient to set a session resumable. Fixes #207
* Prepare 2.76.beta2.76.betaMichael Catanzaro2023-02-092-1/+8
|
* ci: expose test results via junitMichael Catanzaro2023-02-091-1/+7
| | | | | | | | | | Based on citemplates!27 and gcr!119, this makes the test results show up nicely on GitLab. (This also fixes the Windows artifacts path, although it doesn't matter because there are no Windows artifacts.) Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/232>
* gtlsconnection-base: remove property nicks/blurbsMichael Catanzaro2023-02-091-9/+4
| | | | | | | | | | These are useless and just waste time of translators. Could remove them from translation, but they really serve no purpose. Best practice is to not use them nowadays. https://gitlab.gnome.org/GNOME/gtk/-/issues/4904 Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/231>
* Try to fix environment proxy resolver on WindowsMichael Catanzaro2023-02-092-4/+5
| | | | | | | | The entry points were not exported, oops! Found by Chun-wei Fan. Hopefully fixes #185 Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/226>
* Remove static_modules build optionMichael Catanzaro2023-02-022-5/+1
| | | | | | | | | The option is deprecated because it's not useful, but the functionality is not deprecated. This will avoid future confusion at the expense of breaking anybody who is currently using the option. Related: #206 Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/233>
* Update Galician translationFran Dieguez2023-02-011-26/+46
|
* Update Indonesian translationKukuh Syafaat2023-02-011-24/+44
|
* Update German translationJürgen Benvenuti2023-01-281-19/+40
|
* Update Portuguese translationHugo Carvalho2023-01-251-24/+44
|
* Prepare 2.76.alpha2.76.alphaMichael Catanzaro2023-01-052-1/+12
|
* ci: Use meson subprojects instead of gvsbuildNirbheek Chauhan2022-12-306-57/+48
| | | | | | | | | | | | | | | | | | | | 1. gvsbuild has broken CI multiple times in the past while 2. gvsbuild main branch requires python 3.8, and we only have 3.7 3. Older gvsbuild commits / tags have broken URLs, and even if you fix them, the glib version is too old 4. gvsbuild actually takes a very long time to build everything We have an openssl project now. Not suitable for production use, but it's fine for CI. Need newer Meson to be able to use --vsenv reliably: ``` [...] File "C:\Users\user\AppData\Roaming\Python\Python37\site-packages\mesonbuild\mesonlib\vsenv.py", line 96, in _setup_vsenv k, v = bat_line.split('=', 1) ValueError: not enough values to unpack (expected 2, got 1) ```
* Don't try to use keychain CA certificates on iOSNirbheek Chauhan2022-12-291-1/+7
| | | | | SecTrustCopyAnchorCertificates is not available on iOS as certificate data for system-trusted roots is currently unavailable there.
* Update Ukrainian translationYuri Chornoivan2022-12-241-18/+38
|
* tests: skip tls-exporter test for TLS 1.2Natanael Copa2022-11-021-18/+31
| | | | | | | | | TLS exporter does not exist before TLS 1.3 so skip the tls-exporter test for TLS 1.2. Fixes https://gitlab.gnome.org/GNOME/glib-networking/-/issues/201 Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/227>
* ci: use gvsbuild glib-2.74.0 branchMichael Catanzaro2022-11-021-1/+1
| | | | | | The branch we were using has been deleted. Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/228>
* Update Dutch translationNathan Follens2022-11-011-59/+61
| | | | (cherry picked from commit 5f3ff5706f157ca7d99eeb0e346cc6e431b3ccb4)
* Update Russian translationAleksandr Melman2022-10-171-18/+38
|
* Remove auto featuresMichael Catanzaro2022-10-124-10/+6
| | | | | | | | | | | | | | | | I tried to be too clever here and enabled environment proxy support by default whenever libproxy is disabled. This strategy fails because all distros enable auto features: https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/217#note_1529568 The solution is to enable libproxy by default, and disable environment proxy by default. This leaves only two remaining auto features: GnuTLS, which is almost always wanted, and GNOME proxy, which is also almost always wanted. Just pick the right defaults. If you don't want these enabled, pass the flag to disable them. Simple Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/220>
* Fix -Wnonnull-compare warningMichael Catanzaro2022-10-121-1/+1
| | | | | | | | | | [1/4] Compiling C object tls/tests/connection-gnutls.p/connection.c.o ../../../../Projects/glib-networking/tls/tests/connection.c: In function ‘clock_gettime’: ../../../../Projects/glib-networking/tls/tests/connection.c:600:16: warning: ‘nonnull’ argument ‘tp’ compared to NULL [-Wnonnull-compare] 600 | if (ret == 0 && tp) | ~~~~~~~~~^~~~~ Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/224>
* Fix static link on WindowsXavier Claessens2022-10-065-9/+27
| | | | | | | | | | When making a static module on Windows, we should not have `dllexport` on g_io_* functions. However, G_MODULE_EXPORT is defined to always have `dllexport` on Windows because it is made for shared modules only. Building both shared and static modules is not supported on Windows. Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/223>
* Do not install shared module when only static is neededXavier Claessens2022-10-066-10/+13
| | | | Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/223>
* Update Serbian translationМирослав Николић2022-10-031-64/+64
| | | | (cherry picked from commit 37a1a98e8400be905e1f10d26f820f2a00bde410)
* Update Friulian translationFabio Tomat2022-09-281-60/+61
| | | | (cherry picked from commit 722bae762bb92685b557a0fa22b9e06b689b8d8b)
* Update Hungarian translationBalázs Úr2022-09-221-18/+38
|
* Update Occitan translationQuentin PAGÈS2022-09-191-59/+58
| | | | (cherry picked from commit 1f0e0114779dcbf5975f6643f3ebf8fec74d34ec)
* Update Nepali translationPawan Chitrakar2022-09-191-91/+116
| | | | (cherry picked from commit 6cfbd6754265e382c8a3ee4782e4f44e291f8b3d)
* Update Turkish translationEmin Tufan Çetin2022-09-181-75/+42
|
* Update Kazakh translationBaurzhan Muftakhidinov2022-09-181-59/+60
| | | | (cherry picked from commit 3998c84a1be233dc71c2e9542c9e23141b33790b)
* Update French translationGuillaume Bernard2022-09-161-62/+62
| | | | (cherry picked from commit d3c61870b5d31792dfe13ed71d0747324a9f0912)
* Copy 2.74.0 NEWS and version from glib-2-74 branchMichael Catanzaro2022-09-152-1/+6
|
* Update Bulgarian translationAlexander Shopov2022-09-121-71/+84
|
* Remove IP port pairs from unique session ID when hostname existsGoncalo Gomes2022-09-125-45/+95
| | | | | | | | | | | | | | | Modern CDNs should be able to resume sessions even if the IP is different Hence this commit allows usage of the same session ticket across the infrastructure of the CDN, if the servers allow that. In the case where CDN does not allow that, it will just fail to resume the session. Possibly creating new session tickets for the next connections to the same hostname. In the tests we cannot assert that the connection has not been reused as the allegedly random port might have been assigned multiple times by the OS Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/221>
* Created a common implementation for TLS session cacheGoncalo Gomes2022-09-1216-456/+469
| | | | | | | | | | | | | | | | | | | | | | | There are too many similarities between GnuTLS session ID and the session cache, so it is desirable to merge the implementations so that it is easier to maintain and leads to more similar behaviours across backends. This commit moves the OpenSSL backend session cache implementation to the base class as well as the session id calculation. In GnuTLS the session id is also used to assert that the copy session state is done properly (before handshake of the new class and after handshake of the old class). That behaviour was maintained but the session id is now computed when the base class is constructed. Adds as well some operations that need to be abstracted in order for the lifetime of the different objects in each backend to be maintained properly. Fixes #194 Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/221>
* Use available cached tickets when creating connectionsGoncalo Gomes2022-09-128-10/+564
| | | | | | | | | | | | | | | | | | | | | | | | Client certificates could be very slow to process in certain platforms. Hence the client should reuse sessions, if it can, in order to skip any operations that would otherwise slowdown the connection. We use the same assumptions as the GnuTLS implementation for consistency: - Cache maximum size is 50 - Session validity should be maximum 10 minutes as per https://arxiv.org/abs/1810.07304 (section 6) - TLSv1.3 tickets should only be used once as per RFC 8446 §C.4 to avoid client tracking (https://www.rfc-editor.org/rfc/rfc8446.html#appendix-C.4) Glib-networking will use the last session present in the cache for each connection using the same session id, derived from IP/hostname/port/certificate. The server is responsible to provide us with session tickets that we can use. This commit also disables SSL_OP_NO_TICKET. Fixes #147 Signed-off-by: Goncalo Gomes <goncalo.gomes@youview.com> Part-of: <https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/221>
* Update Chinese (China) translationLuming Zh2022-09-111-61/+62
|
* Update Brazilian Portuguese translationLeônidas Araújo2022-09-061-60/+62
|
* Update Korean translationChangwoo Ryu2022-09-041-57/+58
|
* Update German translationJürgen Benvenuti2022-09-031-72/+115
|
* Update Latvian translationRūdolfs Mazurs2022-09-031-66/+65
|
* Update Danish translationAlan Mortensen2022-09-031-62/+59
|
* Update Catalan translationJordi Mas2022-09-021-64/+57
|
* Update Turkish translationEmin Tufan Çetin2022-09-011-59/+61
|
* Prepare 2.74.rc2.74.rcMichael Catanzaro2022-09-012-1/+8
|
* Update Swedish translationLuna Jernberg2022-09-011-60/+61
|