@@ -3565,8 +3565,7 @@ mod tests {
3565
3565
impl Default for Options {
3566
3566
fn default ( ) -> Self {
3567
3567
let secret_key = SecretKey :: generate ( rand:: rngs:: OsRng ) ;
3568
- let tls_auth = crate :: tls:: Authentication :: RawPublicKey ;
3569
- let server_config = make_default_server_config ( & secret_key, tls_auth) ;
3568
+ let server_config = make_default_server_config ( & secret_key) ;
3570
3569
Options {
3571
3570
addr_v4 : None ,
3572
3571
addr_v6 : None ,
@@ -3589,12 +3588,9 @@ mod tests {
3589
3588
}
3590
3589
3591
3590
/// Generate a server config with no ALPNS and a default transport configuration
3592
- fn make_default_server_config (
3593
- secret_key : & SecretKey ,
3594
- tls_auth : crate :: tls:: Authentication ,
3595
- ) -> ServerConfig {
3596
- let quic_server_config = crate :: tls:: TlsConfig :: new ( tls_auth, secret_key. clone ( ) )
3597
- . make_server_config ( vec ! [ ] , false ) ;
3591
+ fn make_default_server_config ( secret_key : & SecretKey ) -> ServerConfig {
3592
+ let quic_server_config =
3593
+ crate :: tls:: TlsConfig :: new ( secret_key. clone ( ) ) . make_server_config ( vec ! [ ] , false ) ;
3598
3594
let mut server_config = ServerConfig :: with_crypto ( Arc :: new ( quic_server_config) ) ;
3599
3595
server_config. transport_config ( Arc :: new ( quinn:: TransportConfig :: default ( ) ) ) ;
3600
3596
server_config
@@ -4166,9 +4162,9 @@ mod tests {
4166
4162
///
4167
4163
/// Use [`magicsock_connect`] to establish connections.
4168
4164
#[ instrument( name = "ep" , skip_all, fields( me = secret_key. public( ) . fmt_short( ) ) ) ]
4169
- async fn magicsock_ep ( secret_key : SecretKey , tls_auth : tls :: Authentication ) -> Result < Handle > {
4170
- let quic_server_config = tls :: TlsConfig :: new ( tls_auth , secret_key . clone ( ) )
4171
- . make_server_config ( vec ! [ ALPN . to_vec( ) ] , true ) ;
4165
+ async fn magicsock_ep ( secret_key : SecretKey ) -> Result < Handle > {
4166
+ let quic_server_config =
4167
+ tls :: TlsConfig :: new ( secret_key . clone ( ) ) . make_server_config ( vec ! [ ALPN . to_vec( ) ] , true ) ;
4172
4168
let mut server_config = ServerConfig :: with_crypto ( Arc :: new ( quic_server_config) ) ;
4173
4169
server_config. transport_config ( Arc :: new ( quinn:: TransportConfig :: default ( ) ) ) ;
4174
4170
@@ -4202,7 +4198,6 @@ mod tests {
4202
4198
ep_secret_key : SecretKey ,
4203
4199
addr : NodeIdMappedAddr ,
4204
4200
node_id : NodeId ,
4205
- tls_auth : tls:: Authentication ,
4206
4201
) -> Result < quinn:: Connection > {
4207
4202
// Endpoint::connect sets this, do the same to have similar behaviour.
4208
4203
let mut transport_config = quinn:: TransportConfig :: default ( ) ;
@@ -4214,7 +4209,6 @@ mod tests {
4214
4209
addr,
4215
4210
node_id,
4216
4211
Arc :: new ( transport_config) ,
4217
- tls_auth,
4218
4212
)
4219
4213
. await
4220
4214
}
@@ -4231,11 +4225,10 @@ mod tests {
4231
4225
mapped_addr : NodeIdMappedAddr ,
4232
4226
node_id : NodeId ,
4233
4227
transport_config : Arc < quinn:: TransportConfig > ,
4234
- tls_auth : tls:: Authentication ,
4235
4228
) -> Result < quinn:: Connection > {
4236
4229
let alpns = vec ! [ ALPN . to_vec( ) ] ;
4237
4230
let quic_client_config =
4238
- tls:: TlsConfig :: new ( tls_auth , ep_secret_key. clone ( ) ) . make_client_config ( alpns, true ) ;
4231
+ tls:: TlsConfig :: new ( ep_secret_key. clone ( ) ) . make_client_config ( alpns, true ) ;
4239
4232
let mut client_config = quinn:: ClientConfig :: new ( Arc :: new ( quic_client_config) ) ;
4240
4233
client_config. transport_config ( transport_config) ;
4241
4234
let connect = ep
@@ -4255,15 +4248,13 @@ mod tests {
4255
4248
// Regression test: if there is no send_addr we should keep being able to use the
4256
4249
// Endpoint.
4257
4250
4258
- let tls_auth = tls:: Authentication :: RawPublicKey ;
4259
-
4260
4251
let secret_key_1 = SecretKey :: from_bytes ( & [ 1u8 ; 32 ] ) ;
4261
4252
let secret_key_2 = SecretKey :: from_bytes ( & [ 2u8 ; 32 ] ) ;
4262
4253
let node_id_2 = secret_key_2. public ( ) ;
4263
4254
let secret_key_missing_node = SecretKey :: from_bytes ( & [ 255u8 ; 32 ] ) ;
4264
4255
let node_id_missing_node = secret_key_missing_node. public ( ) ;
4265
4256
4266
- let msock_1 = magicsock_ep ( secret_key_1. clone ( ) , tls_auth ) . await . unwrap ( ) ;
4257
+ let msock_1 = magicsock_ep ( secret_key_1. clone ( ) ) . await . unwrap ( ) ;
4267
4258
4268
4259
// Generate an address not present in the NodeMap.
4269
4260
let bad_addr = NodeIdMappedAddr :: generate ( ) ;
@@ -4279,14 +4270,13 @@ mod tests {
4279
4270
secret_key_1. clone ( ) ,
4280
4271
bad_addr,
4281
4272
node_id_missing_node,
4282
- tls_auth,
4283
4273
) ,
4284
4274
)
4285
4275
. await ;
4286
4276
assert ! ( res. is_err( ) , "expecting timeout" ) ;
4287
4277
4288
4278
// Now check we can still create another connection with this endpoint.
4289
- let msock_2 = magicsock_ep ( secret_key_2. clone ( ) , tls_auth ) . await . unwrap ( ) ;
4279
+ let msock_2 = magicsock_ep ( secret_key_2. clone ( ) ) . await . unwrap ( ) ;
4290
4280
4291
4281
// This needs an accept task
4292
4282
let accept_task = tokio:: spawn ( {
@@ -4336,13 +4326,7 @@ mod tests {
4336
4326
let addr = msock_1. get_mapping_addr ( node_id_2) . unwrap ( ) ;
4337
4327
let res = tokio:: time:: timeout (
4338
4328
Duration :: from_secs ( 10 ) ,
4339
- magicsock_connect (
4340
- msock_1. endpoint ( ) ,
4341
- secret_key_1. clone ( ) ,
4342
- addr,
4343
- node_id_2,
4344
- tls_auth,
4345
- ) ,
4329
+ magicsock_connect ( msock_1. endpoint ( ) , secret_key_1. clone ( ) , addr, node_id_2) ,
4346
4330
)
4347
4331
. await
4348
4332
. expect ( "timeout while connecting" ) ;
@@ -4360,14 +4344,12 @@ mod tests {
4360
4344
// This specifically tests the `if udp_addr.is_none() && relay_url.is_none()`
4361
4345
// behaviour of MagicSock::try_send.
4362
4346
4363
- let tls_auth = tls:: Authentication :: RawPublicKey ;
4364
-
4365
4347
let secret_key_1 = SecretKey :: from_bytes ( & [ 1u8 ; 32 ] ) ;
4366
4348
let secret_key_2 = SecretKey :: from_bytes ( & [ 2u8 ; 32 ] ) ;
4367
4349
let node_id_2 = secret_key_2. public ( ) ;
4368
4350
4369
- let msock_1 = magicsock_ep ( secret_key_1. clone ( ) , tls_auth ) . await . unwrap ( ) ;
4370
- let msock_2 = magicsock_ep ( secret_key_2. clone ( ) , tls_auth ) . await . unwrap ( ) ;
4351
+ let msock_1 = magicsock_ep ( secret_key_1. clone ( ) ) . await . unwrap ( ) ;
4352
+ let msock_2 = magicsock_ep ( secret_key_2. clone ( ) ) . await . unwrap ( ) ;
4371
4353
let ep_2 = msock_2. endpoint ( ) . clone ( ) ;
4372
4354
4373
4355
// We need a task to accept the connection.
@@ -4425,7 +4407,6 @@ mod tests {
4425
4407
addr_2,
4426
4408
node_id_2,
4427
4409
Arc :: new ( transport_config) ,
4428
- tls_auth,
4429
4410
)
4430
4411
. await ;
4431
4412
assert ! ( res. is_err( ) , "expected timeout" ) ;
@@ -4454,15 +4435,10 @@ mod tests {
4454
4435
// We can now connect
4455
4436
tokio:: time:: timeout ( Duration :: from_secs ( 10 ) , async move {
4456
4437
info ! ( "establishing new connection" ) ;
4457
- let conn = magicsock_connect (
4458
- msock_1. endpoint ( ) ,
4459
- secret_key_1. clone ( ) ,
4460
- addr_2,
4461
- node_id_2,
4462
- tls_auth,
4463
- )
4464
- . await
4465
- . unwrap ( ) ;
4438
+ let conn =
4439
+ magicsock_connect ( msock_1. endpoint ( ) , secret_key_1. clone ( ) , addr_2, node_id_2)
4440
+ . await
4441
+ . unwrap ( ) ;
4466
4442
info ! ( "have connection" ) ;
4467
4443
let mut stream = conn. open_uni ( ) . await . unwrap ( ) ;
4468
4444
stream. write_all ( b"hello" ) . await . unwrap ( ) ;
0 commit comments