diff --git a/http3/client.go b/http3/client.go index e05ca2b4..8ca78bb7 100644 --- a/http3/client.go +++ b/http3/client.go @@ -11,6 +11,7 @@ import ( "sync" "github.com/lucas-clemente/quic-go" + "github.com/lucas-clemente/quic-go/internal/qtls" "github.com/lucas-clemente/quic-go/internal/utils" "github.com/marten-seemann/qpack" ) @@ -240,10 +241,12 @@ func (c *client) doRequest( return nil, newConnError(errorGeneralProtocolError, err) } + connState := qtls.ToTLSConnectionState(c.session.ConnectionState()) res := &http.Response{ Proto: "HTTP/3", ProtoMajor: 3, Header: http.Header{}, + TLS: &connState, } for _, hf := range hfs { switch hf.Name { diff --git a/http3/client_test.go b/http3/client_test.go index 0a2474f1..fd2d998a 100644 --- a/http3/client_test.go +++ b/http3/client_test.go @@ -14,6 +14,9 @@ import ( "github.com/golang/mock/gomock" quic "github.com/lucas-clemente/quic-go" mockquic "github.com/lucas-clemente/quic-go/internal/mocks/quic" + + "github.com/lucas-clemente/quic-go/internal/protocol" + "github.com/lucas-clemente/quic-go/internal/qtls" "github.com/lucas-clemente/quic-go/internal/utils" "github.com/marten-seemann/qpack" @@ -221,6 +224,7 @@ var _ = Describe("Client", func() { gomock.InOrder( sess.EXPECT().HandshakeComplete().Return(handshakeCtx), sess.EXPECT().OpenStreamSync(context.Background()).Return(str, nil), + sess.EXPECT().ConnectionState().Return(qtls.ConnectionState{}), ) str.EXPECT().Write(gomock.Any()).AnyTimes().DoAndReturn(func(p []byte) (int, error) { return len(p), nil }) str.EXPECT().Close() @@ -390,6 +394,7 @@ var _ = Describe("Client", func() { req := request.WithContext(ctx) sess.EXPECT().HandshakeComplete().Return(handshakeCtx) sess.EXPECT().OpenStreamSync(ctx).Return(str, nil) + sess.EXPECT().ConnectionState().Return(qtls.ConnectionState{}) buf := &bytes.Buffer{} str.EXPECT().Close().MaxTimes(1) @@ -451,6 +456,7 @@ var _ = Describe("Client", func() { It("decompresses the response", func() { sess.EXPECT().OpenStreamSync(context.Background()).Return(str, nil) + sess.EXPECT().ConnectionState().Return(qtls.ConnectionState{}) buf := &bytes.Buffer{} rw := newResponseWriter(buf, utils.DefaultLogger) rw.Header().Set("Content-Encoding", "gzip") @@ -476,6 +482,7 @@ var _ = Describe("Client", func() { It("only decompresses the response if the response contains the right content-encoding header", func() { sess.EXPECT().OpenStreamSync(context.Background()).Return(str, nil) + sess.EXPECT().ConnectionState().Return(qtls.ConnectionState{}) buf := &bytes.Buffer{} rw := newResponseWriter(buf, utils.DefaultLogger) rw.Write([]byte("not gzipped")) diff --git a/internal/qtls/go114.go b/internal/qtls/go114.go index 79ad6f0b..c6c6d513 100644 --- a/internal/qtls/go114.go +++ b/internal/qtls/go114.go @@ -143,6 +143,25 @@ func GetConnectionState(conn *Conn) ConnectionState { return conn.ConnectionState() } +// ToTLSConnectionState extracts the tls.ConnectionState +// Warning: Calling ExportKeyingMaterial won't work. +func ToTLSConnectionState(cs ConnectionState) tls.ConnectionState { + return tls.ConnectionState{ + Version: cs.Version, + HandshakeComplete: cs.HandshakeComplete, + DidResume: cs.DidResume, + CipherSuite: cs.CipherSuite, + NegotiatedProtocol: cs.NegotiatedProtocol, + NegotiatedProtocolIsMutual: cs.NegotiatedProtocolIsMutual, + ServerName: cs.ServerName, + PeerCertificates: cs.PeerCertificates, + VerifiedChains: cs.VerifiedChains, + SignedCertificateTimestamps: cs.SignedCertificateTimestamps, + OCSPResponse: cs.OCSPResponse, + TLSUnique: cs.TLSUnique, + } +} + type cipherSuiteTLS13 struct { ID uint16 KeyLen int diff --git a/internal/qtls/go115.go b/internal/qtls/go115.go index a64728c7..72bfb2c8 100644 --- a/internal/qtls/go115.go +++ b/internal/qtls/go115.go @@ -5,6 +5,7 @@ package qtls import ( "crypto" "crypto/cipher" + "crypto/tls" "net" "unsafe" @@ -85,6 +86,11 @@ func GetConnectionState(conn *Conn) ConnectionState { return conn.ConnectionStateWith0RTT() } +// ToTLSConnectionState extracts the tls.ConnectionState +func ToTLSConnectionState(cs ConnectionState) tls.ConnectionState { + return cs.ConnectionState +} + type cipherSuiteTLS13 struct { ID uint16 KeyLen int