mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-04 12:47:36 +03:00
send a NEW_TOKEN from after completing the handshake (as a server)
This commit is contained in:
parent
7c7bcede6c
commit
34543848f0
9 changed files with 97 additions and 29 deletions
|
@ -4,6 +4,7 @@
|
||||||
|
|
||||||
- Implement HTTP/3.
|
- Implement HTTP/3.
|
||||||
- Rename `quic.Cookie` to `quic.Token` and `quic.Config.AcceptCookie` to `quic.Config.AcceptToken`.
|
- Rename `quic.Cookie` to `quic.Token` and `quic.Config.AcceptCookie` to `quic.Config.AcceptToken`.
|
||||||
|
- Distinguish between Retry tokens and tokens sent in NEW_TOKEN frames.
|
||||||
|
|
||||||
## v0.11.0 (2019-04-05)
|
## v0.11.0 (2019-04-05)
|
||||||
|
|
||||||
|
|
|
@ -196,7 +196,12 @@ var _ = Describe("Handshake tests", func() {
|
||||||
}
|
}
|
||||||
|
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
serverConfig.AcceptToken = func(net.Addr, *quic.Token) bool { return true }
|
serverConfig.AcceptToken = func(addr net.Addr, token *quic.Token) bool {
|
||||||
|
if token != nil {
|
||||||
|
Expect(token.IsRetryToken).To(BeFalse())
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
var err error
|
var err error
|
||||||
// start the server, but don't call Accept
|
// start the server, but don't call Accept
|
||||||
server, err = quic.ListenAddr("localhost:0", testdata.GetTLSConfig(), serverConfig)
|
server, err = quic.ListenAddr("localhost:0", testdata.GetTLSConfig(), serverConfig)
|
||||||
|
|
13
interface.go
13
interface.go
|
@ -18,8 +18,12 @@ type VersionNumber = protocol.VersionNumber
|
||||||
|
|
||||||
// A Token can be used to verify the ownership of the client address.
|
// A Token can be used to verify the ownership of the client address.
|
||||||
type Token struct {
|
type Token struct {
|
||||||
RemoteAddr string
|
// IsRetryToken encodes how the client received the token. There are two ways:
|
||||||
SentTime time.Time
|
// * In a Retry packet sent when trying to establish a new connection.
|
||||||
|
// * In a NEW_TOKEN frame on a previous connection.
|
||||||
|
IsRetryToken bool
|
||||||
|
RemoteAddr string
|
||||||
|
SentTime time.Time
|
||||||
}
|
}
|
||||||
|
|
||||||
// An ErrorCode is an application-defined error code.
|
// An ErrorCode is an application-defined error code.
|
||||||
|
@ -189,7 +193,10 @@ type Config struct {
|
||||||
IdleTimeout time.Duration
|
IdleTimeout time.Duration
|
||||||
// AcceptToken determines if a Token is accepted.
|
// AcceptToken determines if a Token is accepted.
|
||||||
// It is called with token = nil if the client didn't send a token.
|
// It is called with token = nil if the client didn't send a token.
|
||||||
// If not set, it verifies that the address matches, and that the token was issued within the last 5 seconds.
|
// If not set, a default verification function is used:
|
||||||
|
// * it verifies that the address matches, and
|
||||||
|
// * if the token is a retry token, that it was issued within the last 5 seconds
|
||||||
|
// * else, that it was issued within the last 24 hours.
|
||||||
// This option is only valid for the server.
|
// This option is only valid for the server.
|
||||||
AcceptToken func(clientAddr net.Addr, token *Token) bool
|
AcceptToken func(clientAddr net.Addr, token *Token) bool
|
||||||
// MaxReceiveStreamFlowControlWindow is the maximum stream-level flow control window for receiving data.
|
// MaxReceiveStreamFlowControlWindow is the maximum stream-level flow control window for receiving data.
|
||||||
|
|
|
@ -16,13 +16,16 @@ const (
|
||||||
|
|
||||||
// A Token is derived from the client address and can be used to verify the ownership of this address.
|
// A Token is derived from the client address and can be used to verify the ownership of this address.
|
||||||
type Token struct {
|
type Token struct {
|
||||||
RemoteAddr string
|
IsRetryToken bool
|
||||||
SentTime time.Time
|
RemoteAddr string
|
||||||
|
SentTime time.Time
|
||||||
|
// only set for retry tokens
|
||||||
OriginalDestConnectionID protocol.ConnectionID
|
OriginalDestConnectionID protocol.ConnectionID
|
||||||
}
|
}
|
||||||
|
|
||||||
// token is the struct that is used for ASN1 serialization and deserialization
|
// token is the struct that is used for ASN1 serialization and deserialization
|
||||||
type token struct {
|
type token struct {
|
||||||
|
IsRetryToken bool
|
||||||
RemoteAddr []byte
|
RemoteAddr []byte
|
||||||
Timestamp int64
|
Timestamp int64
|
||||||
OriginalDestConnectionID []byte
|
OriginalDestConnectionID []byte
|
||||||
|
@ -44,9 +47,10 @@ func NewTokenGenerator() (*TokenGenerator, error) {
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewToken generates a new token for a given source address
|
// NewRetryToken generates a new token for a Retry for a given source address
|
||||||
func (g *TokenGenerator) NewRetryToken(raddr net.Addr, origConnID protocol.ConnectionID) ([]byte, error) {
|
func (g *TokenGenerator) NewRetryToken(raddr net.Addr, origConnID protocol.ConnectionID) ([]byte, error) {
|
||||||
data, err := asn1.Marshal(token{
|
data, err := asn1.Marshal(token{
|
||||||
|
IsRetryToken: true,
|
||||||
RemoteAddr: encodeRemoteAddr(raddr),
|
RemoteAddr: encodeRemoteAddr(raddr),
|
||||||
OriginalDestConnectionID: origConnID,
|
OriginalDestConnectionID: origConnID,
|
||||||
Timestamp: time.Now().UnixNano(),
|
Timestamp: time.Now().UnixNano(),
|
||||||
|
@ -57,6 +61,18 @@ func (g *TokenGenerator) NewRetryToken(raddr net.Addr, origConnID protocol.Conne
|
||||||
return g.tokenProtector.NewToken(data)
|
return g.tokenProtector.NewToken(data)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NewToken generates a new token to be sent in a NEW_TOKEN frame
|
||||||
|
func (g *TokenGenerator) NewToken(raddr net.Addr) ([]byte, error) {
|
||||||
|
data, err := asn1.Marshal(token{
|
||||||
|
RemoteAddr: encodeRemoteAddr(raddr),
|
||||||
|
Timestamp: time.Now().UnixNano(),
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return g.tokenProtector.NewToken(data)
|
||||||
|
}
|
||||||
|
|
||||||
// DecodeToken decodes a token
|
// DecodeToken decodes a token
|
||||||
func (g *TokenGenerator) DecodeToken(encrypted []byte) (*Token, error) {
|
func (g *TokenGenerator) DecodeToken(encrypted []byte) (*Token, error) {
|
||||||
// if the client didn't send any token, DecodeToken will be called with a nil-slice
|
// if the client didn't send any token, DecodeToken will be called with a nil-slice
|
||||||
|
@ -77,8 +93,9 @@ func (g *TokenGenerator) DecodeToken(encrypted []byte) (*Token, error) {
|
||||||
return nil, fmt.Errorf("rest when unpacking token: %d", len(rest))
|
return nil, fmt.Errorf("rest when unpacking token: %d", len(rest))
|
||||||
}
|
}
|
||||||
token := &Token{
|
token := &Token{
|
||||||
RemoteAddr: decodeRemoteAddr(t.RemoteAddr),
|
IsRetryToken: t.IsRetryToken,
|
||||||
SentTime: time.Unix(0, t.Timestamp),
|
RemoteAddr: decodeRemoteAddr(t.RemoteAddr),
|
||||||
|
SentTime: time.Unix(0, t.Timestamp),
|
||||||
}
|
}
|
||||||
if len(t.OriginalDestConnectionID) > 0 {
|
if len(t.OriginalDestConnectionID) > 0 {
|
||||||
token.OriginalDestConnectionID = protocol.ConnectionID(t.OriginalDestConnectionID)
|
token.OriginalDestConnectionID = protocol.ConnectionID(t.OriginalDestConnectionID)
|
||||||
|
|
|
@ -57,6 +57,9 @@ const MaxTrackedSkippedPackets = 10
|
||||||
// If the queue is full, new connection attempts will be rejected.
|
// If the queue is full, new connection attempts will be rejected.
|
||||||
const MaxAcceptQueueSize = 32
|
const MaxAcceptQueueSize = 32
|
||||||
|
|
||||||
|
// TokenValidity is the duration that a (non-retry) token is considered valid
|
||||||
|
const TokenValidity = 24 * time.Hour
|
||||||
|
|
||||||
// RetryTokenValidity is the duration that a retry token is considered valid
|
// RetryTokenValidity is the duration that a retry token is considered valid
|
||||||
const RetryTokenValidity = 10 * time.Second
|
const RetryTokenValidity = 10 * time.Second
|
||||||
|
|
||||||
|
|
14
server.go
14
server.go
|
@ -89,7 +89,7 @@ type server struct {
|
||||||
sessionHandler packetHandlerManager
|
sessionHandler packetHandlerManager
|
||||||
|
|
||||||
// set as a member, so they can be set in the tests
|
// set as a member, so they can be set in the tests
|
||||||
newSession func(connection, sessionRunner, protocol.ConnectionID /* original connection ID */, protocol.ConnectionID /* destination connection ID */, protocol.ConnectionID /* source connection ID */, *Config, *tls.Config, *handshake.TransportParameters, utils.Logger, protocol.VersionNumber) (quicSession, error)
|
newSession func(connection, sessionRunner, protocol.ConnectionID /* original connection ID */, protocol.ConnectionID /* destination connection ID */, protocol.ConnectionID /* source connection ID */, *Config, *tls.Config, *handshake.TransportParameters, *handshake.TokenGenerator, utils.Logger, protocol.VersionNumber) (quicSession, error)
|
||||||
|
|
||||||
serverError error
|
serverError error
|
||||||
errorChan chan struct{}
|
errorChan chan struct{}
|
||||||
|
@ -198,7 +198,11 @@ var defaultAcceptToken = func(clientAddr net.Addr, token *Token) bool {
|
||||||
if token == nil {
|
if token == nil {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
if time.Now().After(token.SentTime.Add(protocol.RetryTokenValidity)) {
|
validity := protocol.TokenValidity
|
||||||
|
if token.IsRetryToken {
|
||||||
|
validity = protocol.RetryTokenValidity
|
||||||
|
}
|
||||||
|
if time.Now().After(token.SentTime.Add(validity)) {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
var sourceAddr string
|
var sourceAddr string
|
||||||
|
@ -387,8 +391,9 @@ func (s *server) handleInitialImpl(p *receivedPacket, hdr *wire.Header) (quicSes
|
||||||
c, err := s.tokenGenerator.DecodeToken(hdr.Token)
|
c, err := s.tokenGenerator.DecodeToken(hdr.Token)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
token = &Token{
|
token = &Token{
|
||||||
RemoteAddr: c.RemoteAddr,
|
IsRetryToken: c.IsRetryToken,
|
||||||
SentTime: c.SentTime,
|
RemoteAddr: c.RemoteAddr,
|
||||||
|
SentTime: c.SentTime,
|
||||||
}
|
}
|
||||||
origDestConnectionID = c.OriginalDestConnectionID
|
origDestConnectionID = c.OriginalDestConnectionID
|
||||||
}
|
}
|
||||||
|
@ -457,6 +462,7 @@ func (s *server) createNewSession(
|
||||||
s.config,
|
s.config,
|
||||||
s.tlsConf,
|
s.tlsConf,
|
||||||
params,
|
params,
|
||||||
|
s.tokenGenerator,
|
||||||
s.logger,
|
s.logger,
|
||||||
version,
|
version,
|
||||||
)
|
)
|
||||||
|
|
|
@ -292,6 +292,7 @@ var _ = Describe("Server", func() {
|
||||||
_ *Config,
|
_ *Config,
|
||||||
_ *tls.Config,
|
_ *tls.Config,
|
||||||
_ *handshake.TransportParameters,
|
_ *handshake.TransportParameters,
|
||||||
|
_ *handshake.TokenGenerator,
|
||||||
_ utils.Logger,
|
_ utils.Logger,
|
||||||
_ protocol.VersionNumber,
|
_ protocol.VersionNumber,
|
||||||
) (quicSession, error) {
|
) (quicSession, error) {
|
||||||
|
@ -341,6 +342,7 @@ var _ = Describe("Server", func() {
|
||||||
_ *Config,
|
_ *Config,
|
||||||
_ *tls.Config,
|
_ *tls.Config,
|
||||||
_ *handshake.TransportParameters,
|
_ *handshake.TransportParameters,
|
||||||
|
_ *handshake.TokenGenerator,
|
||||||
_ utils.Logger,
|
_ utils.Logger,
|
||||||
_ protocol.VersionNumber,
|
_ protocol.VersionNumber,
|
||||||
) (quicSession, error) {
|
) (quicSession, error) {
|
||||||
|
@ -399,6 +401,7 @@ var _ = Describe("Server", func() {
|
||||||
_ *Config,
|
_ *Config,
|
||||||
_ *tls.Config,
|
_ *tls.Config,
|
||||||
_ *handshake.TransportParameters,
|
_ *handshake.TransportParameters,
|
||||||
|
_ *handshake.TokenGenerator,
|
||||||
_ utils.Logger,
|
_ utils.Logger,
|
||||||
_ protocol.VersionNumber,
|
_ protocol.VersionNumber,
|
||||||
) (quicSession, error) {
|
) (quicSession, error) {
|
||||||
|
@ -486,6 +489,7 @@ var _ = Describe("Server", func() {
|
||||||
_ *Config,
|
_ *Config,
|
||||||
_ *tls.Config,
|
_ *tls.Config,
|
||||||
_ *handshake.TransportParameters,
|
_ *handshake.TransportParameters,
|
||||||
|
_ *handshake.TokenGenerator,
|
||||||
_ utils.Logger,
|
_ utils.Logger,
|
||||||
_ protocol.VersionNumber,
|
_ protocol.VersionNumber,
|
||||||
) (quicSession, error) {
|
) (quicSession, error) {
|
||||||
|
@ -518,6 +522,7 @@ var _ = Describe("Server", func() {
|
||||||
_ *Config,
|
_ *Config,
|
||||||
_ *tls.Config,
|
_ *tls.Config,
|
||||||
_ *handshake.TransportParameters,
|
_ *handshake.TransportParameters,
|
||||||
|
_ *handshake.TokenGenerator,
|
||||||
_ utils.Logger,
|
_ utils.Logger,
|
||||||
_ protocol.VersionNumber,
|
_ protocol.VersionNumber,
|
||||||
) (quicSession, error) {
|
) (quicSession, error) {
|
||||||
|
@ -544,8 +549,9 @@ var _ = Describe("default source address verification", func() {
|
||||||
It("accepts a token", func() {
|
It("accepts a token", func() {
|
||||||
remoteAddr := &net.UDPAddr{IP: net.IPv4(192, 168, 0, 1)}
|
remoteAddr := &net.UDPAddr{IP: net.IPv4(192, 168, 0, 1)}
|
||||||
token := &Token{
|
token := &Token{
|
||||||
RemoteAddr: "192.168.0.1",
|
IsRetryToken: true,
|
||||||
SentTime: time.Now().Add(-protocol.RetryTokenValidity).Add(time.Second), // will expire in 1 second
|
RemoteAddr: "192.168.0.1",
|
||||||
|
SentTime: time.Now().Add(-protocol.RetryTokenValidity).Add(time.Second), // will expire in 1 second
|
||||||
}
|
}
|
||||||
Expect(defaultAcceptToken(remoteAddr, token)).To(BeTrue())
|
Expect(defaultAcceptToken(remoteAddr, token)).To(BeTrue())
|
||||||
})
|
})
|
||||||
|
@ -558,8 +564,9 @@ var _ = Describe("default source address verification", func() {
|
||||||
It("rejects a token if the address doesn't match", func() {
|
It("rejects a token if the address doesn't match", func() {
|
||||||
remoteAddr := &net.UDPAddr{IP: net.IPv4(192, 168, 0, 1)}
|
remoteAddr := &net.UDPAddr{IP: net.IPv4(192, 168, 0, 1)}
|
||||||
token := &Token{
|
token := &Token{
|
||||||
RemoteAddr: "127.0.0.1",
|
IsRetryToken: true,
|
||||||
SentTime: time.Now(),
|
RemoteAddr: "127.0.0.1",
|
||||||
|
SentTime: time.Now(),
|
||||||
}
|
}
|
||||||
Expect(defaultAcceptToken(remoteAddr, token)).To(BeFalse())
|
Expect(defaultAcceptToken(remoteAddr, token)).To(BeFalse())
|
||||||
})
|
})
|
||||||
|
@ -567,8 +574,9 @@ var _ = Describe("default source address verification", func() {
|
||||||
It("accepts a token for a remote address is not a UDP address", func() {
|
It("accepts a token for a remote address is not a UDP address", func() {
|
||||||
remoteAddr := &net.TCPAddr{IP: net.IPv4(192, 168, 0, 1), Port: 1337}
|
remoteAddr := &net.TCPAddr{IP: net.IPv4(192, 168, 0, 1), Port: 1337}
|
||||||
token := &Token{
|
token := &Token{
|
||||||
RemoteAddr: "192.168.0.1:1337",
|
IsRetryToken: true,
|
||||||
SentTime: time.Now(),
|
RemoteAddr: "192.168.0.1:1337",
|
||||||
|
SentTime: time.Now(),
|
||||||
}
|
}
|
||||||
Expect(defaultAcceptToken(remoteAddr, token)).To(BeTrue())
|
Expect(defaultAcceptToken(remoteAddr, token)).To(BeTrue())
|
||||||
})
|
})
|
||||||
|
@ -576,8 +584,9 @@ var _ = Describe("default source address verification", func() {
|
||||||
It("rejects an invalid token for a remote address is not a UDP address", func() {
|
It("rejects an invalid token for a remote address is not a UDP address", func() {
|
||||||
remoteAddr := &net.TCPAddr{IP: net.IPv4(192, 168, 0, 1), Port: 1337}
|
remoteAddr := &net.TCPAddr{IP: net.IPv4(192, 168, 0, 1), Port: 1337}
|
||||||
token := &Token{
|
token := &Token{
|
||||||
RemoteAddr: "192.168.0.1:7331", // mismatching port
|
IsRetryToken: true,
|
||||||
SentTime: time.Now(),
|
RemoteAddr: "192.168.0.1:7331", // mismatching port
|
||||||
|
SentTime: time.Now(),
|
||||||
}
|
}
|
||||||
Expect(defaultAcceptToken(remoteAddr, token)).To(BeFalse())
|
Expect(defaultAcceptToken(remoteAddr, token)).To(BeFalse())
|
||||||
})
|
})
|
||||||
|
@ -585,9 +594,22 @@ var _ = Describe("default source address verification", func() {
|
||||||
It("rejects an expired token", func() {
|
It("rejects an expired token", func() {
|
||||||
remoteAddr := &net.UDPAddr{IP: net.IPv4(192, 168, 0, 1)}
|
remoteAddr := &net.UDPAddr{IP: net.IPv4(192, 168, 0, 1)}
|
||||||
token := &Token{
|
token := &Token{
|
||||||
RemoteAddr: "192.168.0.1",
|
IsRetryToken: true,
|
||||||
SentTime: time.Now().Add(-protocol.RetryTokenValidity).Add(-time.Second), // expired 1 second ago
|
RemoteAddr: "192.168.0.1",
|
||||||
|
SentTime: time.Now().Add(-protocol.RetryTokenValidity).Add(-time.Second), // expired 1 second ago
|
||||||
}
|
}
|
||||||
Expect(defaultAcceptToken(remoteAddr, token)).To(BeFalse())
|
Expect(defaultAcceptToken(remoteAddr, token)).To(BeFalse())
|
||||||
})
|
})
|
||||||
|
|
||||||
|
It("accepts a non-retry token", func() {
|
||||||
|
Expect(protocol.RetryTokenValidity).To(BeNumerically("<", protocol.TokenValidity))
|
||||||
|
remoteAddr := &net.UDPAddr{IP: net.IPv4(192, 168, 0, 1)}
|
||||||
|
token := &Token{
|
||||||
|
IsRetryToken: false,
|
||||||
|
RemoteAddr: "192.168.0.1",
|
||||||
|
// if this was a retry token, it would have expired one second ago
|
||||||
|
SentTime: time.Now().Add(-protocol.RetryTokenValidity).Add(-time.Second),
|
||||||
|
}
|
||||||
|
Expect(defaultAcceptToken(remoteAddr, token)).To(BeTrue())
|
||||||
|
})
|
||||||
})
|
})
|
||||||
|
|
15
session.go
15
session.go
|
@ -116,6 +116,7 @@ type session struct {
|
||||||
framer framer
|
framer framer
|
||||||
windowUpdateQueue *windowUpdateQueue
|
windowUpdateQueue *windowUpdateQueue
|
||||||
connFlowController flowcontrol.ConnectionFlowController
|
connFlowController flowcontrol.ConnectionFlowController
|
||||||
|
tokenGenerator *handshake.TokenGenerator // only set for the server
|
||||||
|
|
||||||
unpacker unpacker
|
unpacker unpacker
|
||||||
frameParser wire.FrameParser
|
frameParser wire.FrameParser
|
||||||
|
@ -175,6 +176,7 @@ var newSession = func(
|
||||||
conf *Config,
|
conf *Config,
|
||||||
tlsConf *tls.Config,
|
tlsConf *tls.Config,
|
||||||
params *handshake.TransportParameters,
|
params *handshake.TransportParameters,
|
||||||
|
tokenGenerator *handshake.TokenGenerator,
|
||||||
logger utils.Logger,
|
logger utils.Logger,
|
||||||
v protocol.VersionNumber,
|
v protocol.VersionNumber,
|
||||||
) (quicSession, error) {
|
) (quicSession, error) {
|
||||||
|
@ -184,6 +186,7 @@ var newSession = func(
|
||||||
config: conf,
|
config: conf,
|
||||||
srcConnID: srcConnID,
|
srcConnID: srcConnID,
|
||||||
destConnID: destConnID,
|
destConnID: destConnID,
|
||||||
|
tokenGenerator: tokenGenerator,
|
||||||
perspective: protocol.PerspectiveServer,
|
perspective: protocol.PerspectiveServer,
|
||||||
handshakeCompleteChan: make(chan struct{}),
|
handshakeCompleteChan: make(chan struct{}),
|
||||||
logger: logger,
|
logger: logger,
|
||||||
|
@ -495,13 +498,15 @@ func (s *session) handleHandshakeComplete() {
|
||||||
s.sessionRunner.OnHandshakeComplete(s)
|
s.sessionRunner.OnHandshakeComplete(s)
|
||||||
|
|
||||||
// The client completes the handshake first (after sending the CFIN).
|
// The client completes the handshake first (after sending the CFIN).
|
||||||
// We need to make sure they learn about the peer completing the handshake,
|
// We need to make sure it learns about the server completing the handshake,
|
||||||
// in order to stop retransmitting handshake packets.
|
// in order to stop retransmitting handshake packets.
|
||||||
// They will stop retransmitting handshake packets when receiving the first forward-secure packet.
|
// They will stop retransmitting handshake packets when receiving the first 1-RTT packet.
|
||||||
// We need to make sure that an ack-eliciting 1-RTT packet is sent,
|
|
||||||
// independent from the application protocol.
|
|
||||||
if s.perspective == protocol.PerspectiveServer {
|
if s.perspective == protocol.PerspectiveServer {
|
||||||
s.queueControlFrame(&wire.PingFrame{})
|
token, err := s.tokenGenerator.NewToken(s.conn.RemoteAddr())
|
||||||
|
if err != nil {
|
||||||
|
s.closeLocal(err)
|
||||||
|
}
|
||||||
|
s.queueControlFrame(&wire.NewTokenFrame{Token: token})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -77,8 +77,9 @@ var _ = Describe("Session", func() {
|
||||||
|
|
||||||
sessionRunner = NewMockSessionRunner(mockCtrl)
|
sessionRunner = NewMockSessionRunner(mockCtrl)
|
||||||
mconn = newMockConnection()
|
mconn = newMockConnection()
|
||||||
|
tokenGenerator, err := handshake.NewTokenGenerator()
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
var pSess Session
|
var pSess Session
|
||||||
var err error
|
|
||||||
pSess, err = newSession(
|
pSess, err = newSession(
|
||||||
mconn,
|
mconn,
|
||||||
sessionRunner,
|
sessionRunner,
|
||||||
|
@ -88,6 +89,7 @@ var _ = Describe("Session", func() {
|
||||||
populateServerConfig(&Config{}),
|
populateServerConfig(&Config{}),
|
||||||
nil, // tls.Config
|
nil, // tls.Config
|
||||||
&handshake.TransportParameters{},
|
&handshake.TransportParameters{},
|
||||||
|
tokenGenerator,
|
||||||
utils.DefaultLogger,
|
utils.DefaultLogger,
|
||||||
protocol.VersionTLS,
|
protocol.VersionTLS,
|
||||||
)
|
)
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue