forked from quic-go/quic-go
force clients to set tls.Config.InsecureSkipVerify when using mint
mint doesn't verify the certificate chain. This change forces users of quic-go to acknowledge mint's insecure behavior by explicitely setting InsecureSkipVerify.
This commit is contained in:
@@ -36,7 +36,8 @@ var _ = Describe("Stateless TLS handling", func() {
|
||||
Versions: []protocol.VersionNumber{protocol.VersionTLS},
|
||||
}
|
||||
var err error
|
||||
server, sessionChan, err = newServerTLS(conn, config, nil, testdata.GetTLSConfig())
|
||||
tlsConf := testdata.GetTLSConfig()
|
||||
server, sessionChan, err = newServerTLS(conn, config, nil, tlsConf)
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
server.newMintConn = func(bc *handshake.CryptoStreamConn, v protocol.VersionNumber) (handshake.MintTLS, <-chan handshake.TransportParameters, error) {
|
||||
mintReply = bc
|
||||
|
||||
Reference in New Issue
Block a user