Skip to content

DRAFT: apple network extension support in rama#836

Draft
GlenDC wants to merge 90 commits intomainfrom
feat/apple-network-extensions
Draft

DRAFT: apple network extension support in rama#836
GlenDC wants to merge 90 commits intomainfrom
feat/apple-network-extensions

Conversation

@GlenDC
Copy link
Member

@GlenDC GlenDC commented Feb 23, 2026

@GlenDC GlenDC added this to the v0.3 milestone Feb 23, 2026
@GlenDC GlenDC self-assigned this Feb 23, 2026
@GlenDC GlenDC added enhancement New feature or request Sponsored Funded by Commercial Partners or Sponsors proxy specific to proxies (client -> (proxy: server -> client)) labels Feb 23, 2026
- still very rough (rough in the diamond ;))
- still waiting on apple for proper team entitlements *sigh* wall
- need to still start on proc-macro crate for making contract layer invisible
- need to still write documentation
- a lot more testing... like al ot more
- still need to improve this and underlying code further... but we are
  starting to get somewhere
also hugely simplify and refactor tcp connector
using the new capabilities in dns (streaming + happy eyeball auto resolver

next step: use it also in UDP for some new helpers there
also split tproxy exmaple in sub files to make more clear what is custom
... soon we'll make it even better with the proc macro
also drop direction... transparent proxy can only be outbound.. d'uh...
and decouple prefix from network rule
... will need to do better ping-pong of protocols
between c, p and s to do well
next up: make such socks5 proxy relay a reusable block,
as it is easily shared, making it:

a. easier to update for all when we support more auth flows
b. harder to make mistakes, given the surface becomes fairly small
GlenDC added 29 commits March 8, 2026 19:31
can be used to glue two worlds together,
in case you do not have an egress stream, but do
want to start bridging....
it now is once again a nice service stack now that
we made Bridging a first-class concept... woohoo

including bridging io to bridgeIo... bridge-ception
leakage will need to be fixed properly in future...
not priority now though
makes clearer the intent,
similar to how we split of Io earlier of from stream
including http relay integration,
which uses also the hijack and HTTP Proxy Connect MITM middleware layers...

removed the hop-by-hop removal layers as a tproxy,
should not do these explicitly, given it is supposed to be invisible,
any headers that are forbidden on either say will be removed implicitly
by the backend http logic
no longer works with actual required API...
and anyway probably a bad idea,
instead make it explicit clear how we are binding
probably not needed,
and anyway unreliable as this is different than KepA
+ make proxy conn checker a rama-http-type utility
we now once again should have proxy connect that works
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request proxy specific to proxies (client -> (proxy: server -> client)) Sponsored Funded by Commercial Partners or Sponsors

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant