Releases: klzgrad/naiveproxy
Releases Β· klzgrad/naiveproxy
cronet-test8
- Support setting base::FeatureList with the experimental option
"feature_list": { "enable-features": "...", "disable-features": "..." }
. See comments ofInitializeFromCommandLine
in https://source.chromium.org/chromium/chromium/src/+/main:base/feature_list.h for details. - Support setting the network isolation key of a stream with stream header
-network-isolation-key
. The header value should be a valid URL with different host and port for each different network isolation key. Network isolation takes effect only if it is enabled by experimental
option of"feature_list": { "enable-features": "PartitionConnectionsByNetworkIsolationKey" }
.
v101.0.4951.41-1
Rebased to v101.0.4951.41.
SHA256: https://github.com/klzgrad/naiveproxy/actions/runs/2259518494#artifacts
v100.0.4896.60-1
Rebased to v100.0.4896.60.
SHA256: https://github.com/klzgrad/naiveproxy/actions/runs/2065812616#artifacts
v99.0.4844.51-1
Rebased to 99.0.4844.51.
SHA256: https://github.com/klzgrad/naiveproxy/actions/runs/1924066236#artifacts
v98.0.4758.80-2
Fix QUIC authentication.
SHA256: https://github.com/klzgrad/naiveproxy/actions/runs/1870992938#artifacts
v98.0.4758.80-1
Rebased to 98.0.4758.80.
SHA256: https://github.com/klzgrad/naiveproxy/actions/runs/1817049676#artifacts
v97.0.4692.71-2: Fix Android build
Some static libraries are still required in 32-bit builds.
v97.0.4692.71-1
Rebased to 97.0.4692.71.
SHA256: https://github.com/klzgrad/naiveproxy/actions/runs/1660795433#artifacts
v96.0.4664.45-1
Rebased to 96.0.4664.45.
SHA256: https://github.com/klzgrad/naiveproxy/actions/runs/1462425870#artifacts
v95.0.4638.54-3
- Fixed a crash on IPv6 URLs, e.g. https://[2001:db8::1] #236.
- Rename the option
--concurrency
to--insecure-concurrency
and make it public, with the following documentation:--insecure-concurrency=<N> Use N concurrent tunnel connections to be more robust under bad network conditions. More connections make the tunneling easier to detect and less secure. This project strives for the strongest security against traffic analysis. Using it in an insecure way defeats its purpose. If you must use this, try N=2 first to see if it solves your issues. Strongly recommend against using more than 4 connections here.