mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-07 06:07:36 +03:00
force clients to set tls.Config.InsecureSkipVerify when using mint
mint doesn't verify the certificate chain. This change forces users of quic-go to acknowledge mint's insecure behavior by explicitely setting InsecureSkipVerify.
This commit is contained in:
parent
db0a3d105e
commit
d76f5a839c
4 changed files with 32 additions and 7 deletions
|
@ -36,7 +36,8 @@ var _ = Describe("Stateless TLS handling", func() {
|
|||
Versions: []protocol.VersionNumber{protocol.VersionTLS},
|
||||
}
|
||||
var err error
|
||||
server, sessionChan, err = newServerTLS(conn, config, nil, testdata.GetTLSConfig())
|
||||
tlsConf := testdata.GetTLSConfig()
|
||||
server, sessionChan, err = newServerTLS(conn, config, nil, tlsConf)
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
server.newMintConn = func(bc *handshake.CryptoStreamConn, v protocol.VersionNumber) (handshake.MintTLS, <-chan handshake.TransportParameters, error) {
|
||||
mintReply = bc
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue