mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-04 20:57:36 +03:00
add a quic.Config option to set the handshake timeout
This commit is contained in:
parent
a025e89f03
commit
9040fd25e7
9 changed files with 47 additions and 13 deletions
|
@ -5,4 +5,5 @@
|
||||||
- Add a `quic.Config` option for QUIC versions
|
- Add a `quic.Config` option for QUIC versions
|
||||||
- Add a `quic.Config` option to request truncation of the connection ID from a server
|
- Add a `quic.Config` option to request truncation of the connection ID from a server
|
||||||
- Add a `quic.Config` option to configure the source address validation
|
- Add a `quic.Config` option to configure the source address validation
|
||||||
|
- Add a `quic.Config` option to configure the handshake timeout
|
||||||
- Various bugfixes
|
- Various bugfixes
|
||||||
|
|
|
@ -118,9 +118,15 @@ func populateClientConfig(config *Config) *Config {
|
||||||
versions = protocol.SupportedVersions
|
versions = protocol.SupportedVersions
|
||||||
}
|
}
|
||||||
|
|
||||||
|
handshakeTimeout := protocol.DefaultHandshakeTimeout
|
||||||
|
if config.HandshakeTimeout != 0 {
|
||||||
|
handshakeTimeout = config.HandshakeTimeout
|
||||||
|
}
|
||||||
|
|
||||||
return &Config{
|
return &Config{
|
||||||
TLSConfig: config.TLSConfig,
|
TLSConfig: config.TLSConfig,
|
||||||
Versions: versions,
|
Versions: versions,
|
||||||
|
HandshakeTimeout: handshakeTimeout,
|
||||||
RequestConnectionIDTruncation: config.RequestConnectionIDTruncation,
|
RequestConnectionIDTruncation: config.RequestConnectionIDTruncation,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -4,6 +4,7 @@ import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"errors"
|
"errors"
|
||||||
"net"
|
"net"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/lucas-clemente/quic-go/protocol"
|
"github.com/lucas-clemente/quic-go/protocol"
|
||||||
"github.com/lucas-clemente/quic-go/qerr"
|
"github.com/lucas-clemente/quic-go/qerr"
|
||||||
|
@ -153,9 +154,21 @@ var _ = Describe("Client", func() {
|
||||||
close(done)
|
close(done)
|
||||||
})
|
})
|
||||||
|
|
||||||
It("uses all supported versions, if none are specified in the quic.Config", func() {
|
It("setups with the right values", func() {
|
||||||
|
config := &Config{
|
||||||
|
HandshakeTimeout: 1337 * time.Minute,
|
||||||
|
RequestConnectionIDTruncation: true,
|
||||||
|
}
|
||||||
|
c := populateClientConfig(config)
|
||||||
|
Expect(c.HandshakeTimeout).To(Equal(1337 * time.Minute))
|
||||||
|
Expect(c.RequestConnectionIDTruncation).To(BeTrue())
|
||||||
|
})
|
||||||
|
|
||||||
|
It("fills in default values if options are not set in the Config", func() {
|
||||||
c := populateClientConfig(&Config{})
|
c := populateClientConfig(&Config{})
|
||||||
Expect(c.Versions).To(Equal(protocol.SupportedVersions))
|
Expect(c.Versions).To(Equal(protocol.SupportedVersions))
|
||||||
|
Expect(c.HandshakeTimeout).To(Equal(protocol.DefaultHandshakeTimeout))
|
||||||
|
Expect(c.RequestConnectionIDTruncation).To(BeFalse())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("errors when receiving an invalid first packet from the server", func(done Done) {
|
It("errors when receiving an invalid first packet from the server", func(done Done) {
|
||||||
|
@ -310,7 +323,7 @@ var _ = Describe("Client", func() {
|
||||||
Expect(cconn.(*conn).pconn).To(Equal(packetConn))
|
Expect(cconn.(*conn).pconn).To(Equal(packetConn))
|
||||||
Expect(hostname).To(Equal("quic.clemente.io"))
|
Expect(hostname).To(Equal("quic.clemente.io"))
|
||||||
Expect(version).To(Equal(cl.version))
|
Expect(version).To(Equal(cl.version))
|
||||||
Expect(conf).To(Equal(config))
|
Expect(conf.Versions).To(Equal(config.Versions))
|
||||||
close(done)
|
close(done)
|
||||||
})
|
})
|
||||||
|
|
||||||
|
|
|
@ -71,6 +71,10 @@ type Config struct {
|
||||||
// This saves 8 bytes in the Public Header in every packet. However, if the IP address of the server changes, the connection cannot be migrated.
|
// This saves 8 bytes in the Public Header in every packet. However, if the IP address of the server changes, the connection cannot be migrated.
|
||||||
// Currently only valid for the client.
|
// Currently only valid for the client.
|
||||||
RequestConnectionIDTruncation bool
|
RequestConnectionIDTruncation bool
|
||||||
|
// HandshakeTimeout is the maximum duration that the cryptographic handshake may take.
|
||||||
|
// If the timeout is exceeded, the connection is closed.
|
||||||
|
// If this value is zero, the timeout is set to 10 seconds.
|
||||||
|
HandshakeTimeout time.Duration
|
||||||
// AcceptSTK determines if an STK is accepted.
|
// AcceptSTK determines if an STK is accepted.
|
||||||
// It is called with stk = nil if the client didn't send an STK.
|
// It is called with stk = nil if the client didn't send an STK.
|
||||||
// If not set, it verifies that the address matches, and that the STK was issued within the last 24 hours
|
// If not set, it verifies that the address matches, and that the STK was issued within the last 24 hours
|
||||||
|
|
|
@ -128,8 +128,8 @@ const MaxIdleTimeoutServer = 1 * time.Minute
|
||||||
// MaxIdleTimeoutClient is the idle timeout that the client suggests to the server
|
// MaxIdleTimeoutClient is the idle timeout that the client suggests to the server
|
||||||
const MaxIdleTimeoutClient = 2 * time.Minute
|
const MaxIdleTimeoutClient = 2 * time.Minute
|
||||||
|
|
||||||
// MaxTimeForCryptoHandshake is the default timeout for a connection until the crypto handshake succeeds.
|
// DefaultHandshakeTimeout is the default timeout for a connection until the crypto handshake succeeds.
|
||||||
const MaxTimeForCryptoHandshake = 10 * time.Second
|
const DefaultHandshakeTimeout = 10 * time.Second
|
||||||
|
|
||||||
// ClosedSessionDeleteTimeout the server ignores packets arriving on a connection that is already closed
|
// ClosedSessionDeleteTimeout the server ignores packets arriving on a connection that is already closed
|
||||||
// after this time all information about the old connection will be deleted
|
// after this time all information about the old connection will be deleted
|
||||||
|
|
13
server.go
13
server.go
|
@ -106,15 +106,22 @@ func populateServerConfig(config *Config) *Config {
|
||||||
if len(versions) == 0 {
|
if len(versions) == 0 {
|
||||||
versions = protocol.SupportedVersions
|
versions = protocol.SupportedVersions
|
||||||
}
|
}
|
||||||
|
|
||||||
vsa := defaultAcceptSTK
|
vsa := defaultAcceptSTK
|
||||||
if config.AcceptSTK != nil {
|
if config.AcceptSTK != nil {
|
||||||
vsa = config.AcceptSTK
|
vsa = config.AcceptSTK
|
||||||
}
|
}
|
||||||
|
|
||||||
|
handshakeTimeout := protocol.DefaultHandshakeTimeout
|
||||||
|
if config.HandshakeTimeout != 0 {
|
||||||
|
handshakeTimeout = config.HandshakeTimeout
|
||||||
|
}
|
||||||
|
|
||||||
return &Config{
|
return &Config{
|
||||||
TLSConfig: config.TLSConfig,
|
TLSConfig: config.TLSConfig,
|
||||||
Versions: versions,
|
Versions: versions,
|
||||||
AcceptSTK: vsa,
|
HandshakeTimeout: handshakeTimeout,
|
||||||
|
AcceptSTK: vsa,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -345,9 +345,10 @@ var _ = Describe("Server", func() {
|
||||||
supportedVersions := []protocol.VersionNumber{1, 3, 5}
|
supportedVersions := []protocol.VersionNumber{1, 3, 5}
|
||||||
acceptSTK := func(_ net.Addr, _ *STK) bool { return true }
|
acceptSTK := func(_ net.Addr, _ *STK) bool { return true }
|
||||||
config := Config{
|
config := Config{
|
||||||
TLSConfig: &tls.Config{},
|
TLSConfig: &tls.Config{},
|
||||||
Versions: supportedVersions,
|
Versions: supportedVersions,
|
||||||
AcceptSTK: acceptSTK,
|
AcceptSTK: acceptSTK,
|
||||||
|
HandshakeTimeout: 1337 * time.Hour,
|
||||||
}
|
}
|
||||||
ln, err := Listen(conn, &config)
|
ln, err := Listen(conn, &config)
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
|
@ -356,6 +357,7 @@ var _ = Describe("Server", func() {
|
||||||
Expect(server.sessions).ToNot(BeNil())
|
Expect(server.sessions).ToNot(BeNil())
|
||||||
Expect(server.scfg).ToNot(BeNil())
|
Expect(server.scfg).ToNot(BeNil())
|
||||||
Expect(server.config.Versions).To(Equal(supportedVersions))
|
Expect(server.config.Versions).To(Equal(supportedVersions))
|
||||||
|
Expect(server.config.HandshakeTimeout).To(Equal(1337 * time.Hour))
|
||||||
Expect(reflect.ValueOf(server.config.AcceptSTK)).To(Equal(reflect.ValueOf(acceptSTK)))
|
Expect(reflect.ValueOf(server.config.AcceptSTK)).To(Equal(reflect.ValueOf(acceptSTK)))
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -365,6 +367,7 @@ var _ = Describe("Server", func() {
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
server := ln.(*server)
|
server := ln.(*server)
|
||||||
Expect(server.config.Versions).To(Equal(protocol.SupportedVersions))
|
Expect(server.config.Versions).To(Equal(protocol.SupportedVersions))
|
||||||
|
Expect(server.config.HandshakeTimeout).To(Equal(protocol.DefaultHandshakeTimeout))
|
||||||
Expect(reflect.ValueOf(server.config.AcceptSTK)).To(Equal(reflect.ValueOf(defaultAcceptSTK)))
|
Expect(reflect.ValueOf(server.config.AcceptSTK)).To(Equal(reflect.ValueOf(defaultAcceptSTK)))
|
||||||
})
|
})
|
||||||
|
|
||||||
|
|
|
@ -327,7 +327,7 @@ runLoop:
|
||||||
if now.Sub(s.lastNetworkActivityTime) >= s.idleTimeout() {
|
if now.Sub(s.lastNetworkActivityTime) >= s.idleTimeout() {
|
||||||
s.close(qerr.Error(qerr.NetworkIdleTimeout, "No recent network activity."))
|
s.close(qerr.Error(qerr.NetworkIdleTimeout, "No recent network activity."))
|
||||||
}
|
}
|
||||||
if !s.handshakeComplete && now.Sub(s.sessionCreationTime) >= protocol.MaxTimeForCryptoHandshake {
|
if !s.handshakeComplete && now.Sub(s.sessionCreationTime) >= s.config.HandshakeTimeout {
|
||||||
s.close(qerr.Error(qerr.NetworkIdleTimeout, "Crypto handshake did not complete in time."))
|
s.close(qerr.Error(qerr.NetworkIdleTimeout, "Crypto handshake did not complete in time."))
|
||||||
}
|
}
|
||||||
s.garbageCollectStreams()
|
s.garbageCollectStreams()
|
||||||
|
@ -354,7 +354,7 @@ func (s *session) maybeResetTimer() {
|
||||||
nextDeadline = utils.MinTime(nextDeadline, lossTime)
|
nextDeadline = utils.MinTime(nextDeadline, lossTime)
|
||||||
}
|
}
|
||||||
if !s.handshakeComplete {
|
if !s.handshakeComplete {
|
||||||
handshakeDeadline := s.sessionCreationTime.Add(protocol.MaxTimeForCryptoHandshake)
|
handshakeDeadline := s.sessionCreationTime.Add(s.config.HandshakeTimeout)
|
||||||
nextDeadline = utils.MinTime(nextDeadline, handshakeDeadline)
|
nextDeadline = utils.MinTime(nextDeadline, handshakeDeadline)
|
||||||
}
|
}
|
||||||
if !s.receivedTooManyUndecrytablePacketsTime.IsZero() {
|
if !s.receivedTooManyUndecrytablePacketsTime.IsZero() {
|
||||||
|
|
|
@ -1403,7 +1403,7 @@ var _ = Describe("Session", func() {
|
||||||
})
|
})
|
||||||
|
|
||||||
It("times out due to non-completed crypto handshake", func(done Done) {
|
It("times out due to non-completed crypto handshake", func(done Done) {
|
||||||
sess.sessionCreationTime = time.Now().Add(-time.Hour)
|
sess.sessionCreationTime = time.Now().Add(-protocol.DefaultHandshakeTimeout).Add(-time.Second)
|
||||||
sess.run() // Would normally not return
|
sess.run() // Would normally not return
|
||||||
Expect(mconn.written[0]).To(ContainSubstring("Crypto handshake did not complete in time."))
|
Expect(mconn.written[0]).To(ContainSubstring("Crypto handshake did not complete in time."))
|
||||||
Expect(sess.runClosed).To(BeClosed())
|
Expect(sess.runClosed).To(BeClosed())
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue