client: Fix timeout reset during TLS handshake #925
Merged
+1
−1
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This commit fixes
(*client.Conn).writeAuthHandshake()
to usepacket.NewConnWithTimeout
instead ofpacket.NewBufferedConn
when recreating the packet connection after switching TLS on. This preserves the connection read/write timeout settings which would otherwise be reset to zero.Since this code executes after some reads and writes have already taken place, and the packet connection code only sets a deadline when the timeout values are nonzero, the result was that previously when connecting using TLS and with a read and/or write timeout set, the connection would inevitably fail just one timeout-duration after being opened.
This use of
packet.NewBufferedConn
appears to be the only place in theclient
package where a packet connection was recreated without the timeout configuration being plumbed through.