quic-go: github.com/lucas-clemente/quic-go Index | Files | Directories

package quic

import "github.com/lucas-clemente/quic-go"

Index

Package Files

buffer_pool.go client.go closed_session.go config.go conn.go conn_ecn.go conn_helper_linux.go conn_id_generator.go conn_id_manager.go crypto_stream.go crypto_stream_manager.go frame_sorter.go framer.go interface.go mockgen.go multiplexer.go packet_handler_map.go packet_packer.go packet_unpacker.go receive_stream.go retransmission_queue.go send_conn.go send_queue.go send_stream.go server.go session.go stream.go stream_deadline_error.go streams_map.go streams_map_generic_helper.go streams_map_incoming_bidi.go streams_map_incoming_generic.go streams_map_incoming_uni.go streams_map_outgoing_bidi.go streams_map_outgoing_generic.go streams_map_outgoing_uni.go token_store.go window_update_queue.go zero_rtt_queue.go

Constants

const (
    // VersionDraft29 is IETF QUIC draft-29
    VersionDraft29 = protocol.VersionDraft29
    // VersionDraft32 is IETF QUIC draft-32
    VersionDraft32 = protocol.VersionDraft32
)

Variables

var RetireBugBackwardsCompatibilityMode bool

RetireBugBackwardsCompatibilityMode controls a backwards compatibility mode, necessary due to a bug in quic-go v0.17.2 (and earlier), where under certain circumstances, an endpoint would retire the connection ID it is currently using. See https://github.com/lucas-clemente/quic-go/issues/2658. The bug has now been fixed, and new deployments have nothing to worry about. Deployments that already have quic-go <= v0.17.2 deployed should active RetireBugBackwardsCompatibilityMode. If activated, quic-go will take steps to avoid the bug from triggering when connected to endpoints that are still running quic-go <= v0.17.2. This flag will be removed in a future version of quic-go.

type ClientToken Uses

type ClientToken struct {
    // contains filtered or unexported fields
}

A ClientToken is a token received by the client. It can be used to skip address validation on future connection attempts.

type Config Uses

type Config struct {
    // The QUIC versions that can be negotiated.
    // If not set, it uses all versions available.
    // Warning: This API should not be considered stable and will change soon.
    Versions []VersionNumber
    // The length of the connection ID in bytes.
    // It can be 0, or any value between 4 and 18.
    // If not set, the interpretation depends on where the Config is used:
    // If used for dialing an address, a 0 byte connection ID will be used.
    // If used for a server, or dialing on a packet conn, a 4 byte connection ID will be used.
    // When dialing on a packet conn, the ConnectionIDLength value must be the same for every Dial call.
    ConnectionIDLength int
    // HandshakeTimeout is the maximum duration that the cryptographic handshake may take.
    // If the timeout is exceeded, the connection is closed.
    // If this value is zero, the timeout is set to 10 seconds.
    HandshakeTimeout time.Duration
    // MaxIdleTimeout is the maximum duration that may pass without any incoming network activity.
    // The actual value for the idle timeout is the minimum of this value and the peer's.
    // This value only applies after the handshake has completed.
    // If the timeout is exceeded, the connection is closed.
    // If this value is zero, the timeout is set to 30 seconds.
    MaxIdleTimeout time.Duration
    // AcceptToken determines if a Token is accepted.
    // It is called with token = nil if the client didn't send a token.
    // If not set, a default verification function is used:
    // * it verifies that the address matches, and
    //   * if the token is a retry token, that it was issued within the last 5 seconds
    //   * else, that it was issued within the last 24 hours.
    // This option is only valid for the server.
    AcceptToken func(clientAddr net.Addr, token *Token) bool
    // The TokenStore stores tokens received from the server.
    // Tokens are used to skip address validation on future connection attempts.
    // The key used to store tokens is the ServerName from the tls.Config, if set
    // otherwise the token is associated with the server's IP address.
    TokenStore TokenStore
    // MaxReceiveStreamFlowControlWindow is the maximum stream-level flow control window for receiving data.
    // If this value is zero, it will default to 1 MB for the server and 6 MB for the client.
    MaxReceiveStreamFlowControlWindow uint64
    // MaxReceiveConnectionFlowControlWindow is the connection-level flow control window for receiving data.
    // If this value is zero, it will default to 1.5 MB for the server and 15 MB for the client.
    MaxReceiveConnectionFlowControlWindow uint64
    // MaxIncomingStreams is the maximum number of concurrent bidirectional streams that a peer is allowed to open.
    // Values above 2^60 are invalid.
    // If not set, it will default to 100.
    // If set to a negative value, it doesn't allow any bidirectional streams.
    MaxIncomingStreams int64
    // MaxIncomingUniStreams is the maximum number of concurrent unidirectional streams that a peer is allowed to open.
    // Values above 2^60 are invalid.
    // If not set, it will default to 100.
    // If set to a negative value, it doesn't allow any unidirectional streams.
    MaxIncomingUniStreams int64
    // The StatelessResetKey is used to generate stateless reset tokens.
    // If no key is configured, sending of stateless resets is disabled.
    StatelessResetKey []byte
    // KeepAlive defines whether this peer will periodically send a packet to keep the connection alive.
    KeepAlive bool
    // QUIC Event Tracer (see https://github.com/google/quic-trace).
    // Warning: Support for quic-trace will soon be dropped in favor of qlog.
    // It is disabled by default. Use the "quictrace" build tag to enable (e.g. go build -tags quictrace).
    QuicTracer quictrace.Tracer
    Tracer     logging.Tracer
}

Config contains all configuration data needed for a QUIC server or client.

func (*Config) Clone Uses

func (c *Config) Clone() *Config

Clone clones a Config

type ConnectionState Uses

type ConnectionState = handshake.ConnectionState

type ECNCapablePacketConn Uses

type ECNCapablePacketConn interface {
    net.PacketConn
    SyscallConn() (syscall.RawConn, error)
    ReadMsgUDP(b, oob []byte) (n, oobn, flags int, addr *net.UDPAddr, err error)
}

If the PacketConn passed to Dial or Listen satisfies this interface, quic-go will read the ECN bits from the IP header. In this case, ReadMsgUDP() will be used instead of ReadFrom() to read packets.

type EarlyListener Uses

type EarlyListener interface {
    // Close the server. All active sessions will be closed.
    Close() error
    // Addr returns the local network addr that the server is listening on.
    Addr() net.Addr
    // Accept returns new early sessions. It should be called in a loop.
    Accept(context.Context) (EarlySession, error)
}

An EarlyListener listens for incoming QUIC connections, and returns them before the handshake completes.

func ListenAddrEarly Uses

func ListenAddrEarly(addr string, tlsConf *tls.Config, config *Config) (EarlyListener, error)

ListenAddrEarly works like ListenAddr, but it returns sessions before the handshake completes.

func ListenEarly Uses

func ListenEarly(conn net.PacketConn, tlsConf *tls.Config, config *Config) (EarlyListener, error)

ListenEarly works like Listen, but it returns sessions before the handshake completes.

type EarlySession Uses

type EarlySession interface {
    Session

    // Blocks until the handshake completes (or fails).
    // Data sent before completion of the handshake is encrypted with 1-RTT keys.
    // Note that the client's identity hasn't been verified yet.
    HandshakeComplete() context.Context
}

An EarlySession is a session that is handshaking. Data sent during the handshake is encrypted using the forward secure keys. When using client certificates, the client's identity is only verified after completion of the handshake.

func DialAddrEarly Uses

func DialAddrEarly(
    addr string,
    tlsConf *tls.Config,
    config *Config,
) (EarlySession, error)

DialAddrEarly establishes a new 0-RTT QUIC connection to a server. It uses a new UDP connection and closes this connection when the QUIC session is closed. The hostname for SNI is taken from the given address. The tls.Config.CipherSuites allows setting of TLS 1.3 cipher suites.

func DialAddrEarlyContext Uses

func DialAddrEarlyContext(
    ctx context.Context,
    addr string,
    tlsConf *tls.Config,
    config *Config,
) (EarlySession, error)

DialAddrEarlyContext establishes a new 0-RTT QUIC connection to a server using provided context. See DialAddrEarly for details

func DialEarly Uses

func DialEarly(
    pconn net.PacketConn,
    remoteAddr net.Addr,
    host string,
    tlsConf *tls.Config,
    config *Config,
) (EarlySession, error)

DialEarly establishes a new 0-RTT QUIC connection to a server using a net.PacketConn. The same PacketConn can be used for multiple calls to Dial and Listen, QUIC connection IDs are used for demultiplexing the different connections. The host parameter is used for SNI. The tls.Config must define an application protocol (using NextProtos).

func DialEarlyContext Uses

func DialEarlyContext(
    ctx context.Context,
    pconn net.PacketConn,
    remoteAddr net.Addr,
    host string,
    tlsConf *tls.Config,
    config *Config,
) (EarlySession, error)

DialEarlyContext establishes a new 0-RTT QUIC connection to a server using a net.PacketConn using the provided context. See DialEarly for details.

type ErrorCode Uses

type ErrorCode = protocol.ApplicationErrorCode

An ErrorCode is an application-defined error code. Valid values range between 0 and MAX_UINT62.

type Listener Uses

type Listener interface {
    // Close the server. All active sessions will be closed.
    Close() error
    // Addr returns the local network addr that the server is listening on.
    Addr() net.Addr
    // Accept returns new sessions. It should be called in a loop.
    Accept(context.Context) (Session, error)
}

A Listener for incoming QUIC connections

func Listen Uses

func Listen(conn net.PacketConn, tlsConf *tls.Config, config *Config) (Listener, error)

Listen listens for QUIC connections on a given net.PacketConn. If the PacketConn satisfies the ECNCapablePacketConn interface (as a net.UDPConn does), ECN support will be enabled. In this case, ReadMsgUDP will be used instead of ReadFrom to read packets. A single net.PacketConn only be used for a single call to Listen. The PacketConn can be used for simultaneous calls to Dial. QUIC connection IDs are used for demultiplexing the different connections. The tls.Config must not be nil and must contain a certificate configuration. The tls.Config.CipherSuites allows setting of TLS 1.3 cipher suites. Furthermore, it must define an application control (using NextProtos). The quic.Config may be nil, in that case the default values will be used.

func ListenAddr Uses

func ListenAddr(addr string, tlsConf *tls.Config, config *Config) (Listener, error)

ListenAddr creates a QUIC server listening on a given address. The tls.Config must not be nil and must contain a certificate configuration. The quic.Config may be nil, in that case the default values will be used.

type ReceiveStream Uses

type ReceiveStream interface {
    // StreamID returns the stream ID.
    StreamID() StreamID
    // Read reads data from the stream.
    // Read can be made to time out and return a net.Error with Timeout() == true
    // after a fixed time limit; see SetDeadline and SetReadDeadline.
    // If the stream was canceled by the peer, the error implements the StreamError
    // interface, and Canceled() == true.
    // If the session was closed due to a timeout, the error satisfies
    // the net.Error interface, and Timeout() will be true.
    io.Reader
    // CancelRead aborts receiving on this stream.
    // It will ask the peer to stop transmitting stream data.
    // Read will unblock immediately, and future Read calls will fail.
    // When called multiple times or after reading the io.EOF it is a no-op.
    CancelRead(ErrorCode)

    SetReadDeadline(t time.Time) error
}

A ReceiveStream is a unidirectional Receive Stream.

type SendStream Uses

type SendStream interface {
    // StreamID returns the stream ID.
    StreamID() StreamID
    // Write writes data to the stream.
    // Write can be made to time out and return a net.Error with Timeout() == true
    // after a fixed time limit; see SetDeadline and SetWriteDeadline.
    // If the stream was canceled by the peer, the error implements the StreamError
    // interface, and Canceled() == true.
    // If the session was closed due to a timeout, the error satisfies
    // the net.Error interface, and Timeout() will be true.
    io.Writer
    // Close closes the write-direction of the stream.
    // Future calls to Write are not permitted after calling Close.
    // It must not be called concurrently with Write.
    // It must not be called after calling CancelWrite.
    io.Closer
    // CancelWrite aborts sending on this stream.
    // Data already written, but not yet delivered to the peer is not guaranteed to be delivered reliably.
    // Write will unblock immediately, and future calls to Write will fail.
    // When called multiple times or after closing the stream it is a no-op.
    CancelWrite(ErrorCode)
    // The context is canceled as soon as the write-side of the stream is closed.
    // This happens when Close() or CancelWrite() is called, or when the peer
    // cancels the read-side of their stream.
    // Warning: This API should not be considered stable and might change soon.
    Context() context.Context
    // SetWriteDeadline sets the deadline for future Write calls
    // and any currently-blocked Write call.
    // Even if write times out, it may return n > 0, indicating that
    // some of the data was successfully written.
    // A zero value for t means Write will not time out.
    SetWriteDeadline(t time.Time) error
}

A SendStream is a unidirectional Send Stream.

type Session Uses

type Session interface {
    // AcceptStream returns the next stream opened by the peer, blocking until one is available.
    // If the session was closed due to a timeout, the error satisfies
    // the net.Error interface, and Timeout() will be true.
    AcceptStream(context.Context) (Stream, error)
    // AcceptUniStream returns the next unidirectional stream opened by the peer, blocking until one is available.
    // If the session was closed due to a timeout, the error satisfies
    // the net.Error interface, and Timeout() will be true.
    AcceptUniStream(context.Context) (ReceiveStream, error)
    // OpenStream opens a new bidirectional QUIC stream.
    // There is no signaling to the peer about new streams:
    // The peer can only accept the stream after data has been sent on the stream.
    // If the error is non-nil, it satisfies the net.Error interface.
    // When reaching the peer's stream limit, err.Temporary() will be true.
    // If the session was closed due to a timeout, Timeout() will be true.
    OpenStream() (Stream, error)
    // OpenStreamSync opens a new bidirectional QUIC stream.
    // It blocks until a new stream can be opened.
    // If the error is non-nil, it satisfies the net.Error interface.
    // If the session was closed due to a timeout, Timeout() will be true.
    OpenStreamSync(context.Context) (Stream, error)
    // OpenUniStream opens a new outgoing unidirectional QUIC stream.
    // If the error is non-nil, it satisfies the net.Error interface.
    // When reaching the peer's stream limit, Temporary() will be true.
    // If the session was closed due to a timeout, Timeout() will be true.
    OpenUniStream() (SendStream, error)
    // OpenUniStreamSync opens a new outgoing unidirectional QUIC stream.
    // It blocks until a new stream can be opened.
    // If the error is non-nil, it satisfies the net.Error interface.
    // If the session was closed due to a timeout, Timeout() will be true.
    OpenUniStreamSync(context.Context) (SendStream, error)
    // LocalAddr returns the local address.
    LocalAddr() net.Addr
    // RemoteAddr returns the address of the peer.
    RemoteAddr() net.Addr
    // Close the connection with an error.
    // The error string will be sent to the peer.
    CloseWithError(ErrorCode, string) error
    // The context is cancelled when the session is closed.
    // Warning: This API should not be considered stable and might change soon.
    Context() context.Context
    // ConnectionState returns basic details about the QUIC connection.
    // It blocks until the handshake completes.
    // Warning: This API should not be considered stable and might change soon.
    ConnectionState() ConnectionState
}

A Session is a QUIC connection between two peers.

func Dial Uses

func Dial(
    pconn net.PacketConn,
    remoteAddr net.Addr,
    host string,
    tlsConf *tls.Config,
    config *Config,
) (Session, error)

Dial establishes a new QUIC connection to a server using a net.PacketConn. If the PacketConn satisfies the ECNCapablePacketConn interface (as a net.UDPConn does), ECN support will be enabled. In this case, ReadMsgUDP will be used instead of ReadFrom to read packets. The same PacketConn can be used for multiple calls to Dial and Listen, QUIC connection IDs are used for demultiplexing the different connections. The host parameter is used for SNI. The tls.Config must define an application protocol (using NextProtos).

func DialAddr Uses

func DialAddr(
    addr string,
    tlsConf *tls.Config,
    config *Config,
) (Session, error)

DialAddr establishes a new QUIC connection to a server. It uses a new UDP connection and closes this connection when the QUIC session is closed. The hostname for SNI is taken from the given address. The tls.Config.CipherSuites allows setting of TLS 1.3 cipher suites.

func DialAddrContext Uses

func DialAddrContext(
    ctx context.Context,
    addr string,
    tlsConf *tls.Config,
    config *Config,
) (Session, error)

DialAddrContext establishes a new QUIC connection to a server using the provided context. See DialAddr for details.

func DialContext Uses

func DialContext(
    ctx context.Context,
    pconn net.PacketConn,
    remoteAddr net.Addr,
    host string,
    tlsConf *tls.Config,
    config *Config,
) (Session, error)

DialContext establishes a new QUIC connection to a server using a net.PacketConn using the provided context. See Dial for details.

type Stream Uses

type Stream interface {
    ReceiveStream
    SendStream
    // SetDeadline sets the read and write deadlines associated
    // with the connection. It is equivalent to calling both
    // SetReadDeadline and SetWriteDeadline.
    SetDeadline(t time.Time) error
}

Stream is the interface implemented by QUIC streams

type StreamError Uses

type StreamError interface {
    error
    Canceled() bool
    ErrorCode() ErrorCode
}

StreamError is returned by Read and Write when the peer cancels the stream.

type StreamID Uses

type StreamID = protocol.StreamID

The StreamID is the ID of a QUIC stream.

type Token Uses

type Token struct {
    // IsRetryToken encodes how the client received the token. There are two ways:
    // * In a Retry packet sent when trying to establish a new connection.
    // * In a NEW_TOKEN frame on a previous connection.
    IsRetryToken bool
    RemoteAddr   string
    SentTime     time.Time
}

A Token can be used to verify the ownership of the client address.

type TokenStore Uses

type TokenStore interface {
    // Pop searches for a ClientToken associated with the given key.
    // Since tokens are not supposed to be reused, it must remove the token from the cache.
    // It returns nil when no token is found.
    Pop(key string) (token *ClientToken)

    // Put adds a token to the cache with the given key. It might get called
    // multiple times in a connection.
    Put(key string, token *ClientToken)
}

func NewLRUTokenStore Uses

func NewLRUTokenStore(maxOrigins, tokensPerOrigin int) TokenStore

NewLRUTokenStore creates a new LRU cache for tokens received by the client. maxOrigins specifies how many origins this cache is saving tokens for. tokensPerOrigin specifies the maximum number of tokens per origin.

type VersionNumber Uses

type VersionNumber = protocol.VersionNumber

A VersionNumber is a QUIC version number.

Directories

PathSynopsis
example
example/client
example/echo
http3
integrationtests/tools/israce
integrationtests/tools/proxy
internal/ackhandler
internal/congestion
internal/flowcontrol
internal/handshake
internal/logutils
internal/mocksPackage mocks is a generated GoMock package.
internal/mocks/ackhandlerPackage mockackhandler is a generated GoMock package.
internal/mocks/loggingPackage mocklogging is a generated GoMock package.
internal/mocks/quicPackage mockquic is a generated GoMock package.
internal/mocks/tlsPackage mocktls is a generated GoMock package.
internal/protocol
internal/qerr
internal/qtls
internal/testutils
internal/utils
internal/utils/linkedlist
internal/wire
loggingPackage logging defines a logging interface for quic-go.
metrics
qlog
quictrace
quictrace/pb

Package quic imports 32 packages (graph) and is imported by 209 packages. Updated 2020-11-24. Refresh now. Tools for package owners.