mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-04 04:37:36 +03:00
parent
31be6464be
commit
8cd1deba54
2 changed files with 119 additions and 0 deletions
|
@ -38,6 +38,10 @@ Using Chrome:
|
|||
|
||||
/Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --user-data-dir=/tmp/chrome --no-proxy-server --enable-quic --origin-to-force-quic-on=quic.clemente.io:443 --host-resolver-rules='MAP quic.clemente.io:443 127.0.0.1:6121' https://quic.clemente.io
|
||||
|
||||
### QUIC without HTTP/2
|
||||
|
||||
Take a look at [this echo example](example/echo/echo.go).
|
||||
|
||||
### Using the example client
|
||||
|
||||
go run example/client/main.go https://clemente.io
|
||||
|
|
115
example/echo/echo.go
Normal file
115
example/echo/echo.go
Normal file
|
@ -0,0 +1,115 @@
|
|||
package main
|
||||
|
||||
import (
|
||||
"crypto/rand"
|
||||
"crypto/rsa"
|
||||
"crypto/tls"
|
||||
"crypto/x509"
|
||||
"encoding/pem"
|
||||
"fmt"
|
||||
"io"
|
||||
"log"
|
||||
"math/big"
|
||||
|
||||
quic "github.com/lucas-clemente/quic-go"
|
||||
)
|
||||
|
||||
const addr = "localhost:4242"
|
||||
|
||||
const message = "foobar"
|
||||
|
||||
// We start a server echoing data on the first stream the client opens,
|
||||
// then connect with a client, send the message, and wait for its receipt.
|
||||
func main() {
|
||||
go func() { log.Fatal(echoServer()) }()
|
||||
|
||||
err := clientMain()
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
}
|
||||
|
||||
// Start a server that echos all data on the first stream opened by the client
|
||||
func echoServer() error {
|
||||
cfgServer := &quic.Config{
|
||||
TLSConfig: generateTLSConfig(),
|
||||
ConnState: func(sess quic.Session, cs quic.ConnState) {
|
||||
// Ignore unless the handshake is finished
|
||||
if cs != quic.ConnStateForwardSecure {
|
||||
return
|
||||
}
|
||||
go func() {
|
||||
stream, err := sess.AcceptStream()
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
// Echo through the loggingWriter
|
||||
go io.Copy(loggingWriter{stream}, stream)
|
||||
}()
|
||||
},
|
||||
}
|
||||
listener, err := quic.ListenAddr(addr, cfgServer)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return listener.Serve()
|
||||
}
|
||||
|
||||
func clientMain() error {
|
||||
cfgClient := &quic.Config{
|
||||
TLSConfig: &tls.Config{InsecureSkipVerify: true},
|
||||
}
|
||||
session, err := quic.DialAddr(addr, cfgClient)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
stream, err := session.OpenStreamSync()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
fmt.Printf("Client: Sending '%s'\n", message)
|
||||
_, err = stream.Write([]byte(message))
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
buf := make([]byte, len(message))
|
||||
_, err = io.ReadFull(stream, buf)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
fmt.Printf("Client: Got '%s'\n", buf)
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// A wrapper for io.Writer that also logs the message.
|
||||
type loggingWriter struct{ io.Writer }
|
||||
|
||||
func (w loggingWriter) Write(b []byte) (int, error) {
|
||||
fmt.Printf("Server: Got '%s'\n", string(b))
|
||||
return w.Writer.Write(b)
|
||||
}
|
||||
|
||||
// Setup a bare-bones TLS config for the server
|
||||
func generateTLSConfig() *tls.Config {
|
||||
key, err := rsa.GenerateKey(rand.Reader, 1024)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
template := x509.Certificate{SerialNumber: big.NewInt(1)}
|
||||
certDER, err := x509.CreateCertificate(rand.Reader, &template, &template, &key.PublicKey, key)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
keyPEM := pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(key)})
|
||||
certPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: certDER})
|
||||
|
||||
tlsCert, err := tls.X509KeyPair(certPEM, keyPEM)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return &tls.Config{Certificates: []tls.Certificate{tlsCert}}
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue