summaryrefslogtreecommitdiff
path: root/internal/httpclient/client.go
diff options
context:
space:
mode:
authorLibravatar kim <89579420+NyaaaWhatsUpDoc@users.noreply.github.com>2022-09-28 18:30:40 +0100
committerLibravatar GitHub <noreply@github.com>2022-09-28 18:30:40 +0100
commita156188b3eb5cb3da44aa1b7452265f5fa38a607 (patch)
tree7097fa48d56fbabc7c2c8750b1f3bc9321d71c0f /internal/httpclient/client.go
parent[bugfix] Fix emphasis being added to emoji shortcodes with markdown parsing (... (diff)
downloadgotosocial-a156188b3eb5cb3da44aa1b7452265f5fa38a607.tar.xz
[chore] update dependencies, bump to Go 1.19.1 (#826)
* update dependencies, bump Go version to 1.19 * bump test image Go version * update golangci-lint * update gotosocial-drone-build * sign * linting, go fmt * update swagger docs * update swagger docs * whitespace * update contributing.md * fuckin whoopsie doopsie * linterino, linteroni * fix followrequest test not starting processor * fix other api/client tests not starting processor * fix remaining tests where processor not started * bump go-runners version * don't check last-webfingered-at, processor may have updated this * update swagger command * update bun to latest version * fix embed to work the same as before with new bun Signed-off-by: kim <grufwub@gmail.com> Co-authored-by: tsmethurst <tobi.smethurst@protonmail.com>
Diffstat (limited to 'internal/httpclient/client.go')
-rw-r--r--internal/httpclient/client.go14
1 files changed, 7 insertions, 7 deletions
diff --git a/internal/httpclient/client.go b/internal/httpclient/client.go
index 45994b2ba..7aa0cd8ea 100644
--- a/internal/httpclient/client.go
+++ b/internal/httpclient/client.go
@@ -71,13 +71,13 @@ type Config struct {
}
// Client wraps an underlying http.Client{} to provide the following:
-// - setting a maximum received request body size, returning error on
-// large content lengths, and using a limited reader in all other
-// cases to protect against forged / unknown content-lengths
-// - protection from server side request forgery (SSRF) by only dialing
-// out to known public IP prefixes, configurable with allows/blocks
-// - limit number of concurrent requests, else blocking until a slot
-// is available (context channels still respected)
+// - setting a maximum received request body size, returning error on
+// large content lengths, and using a limited reader in all other
+// cases to protect against forged / unknown content-lengths
+// - protection from server side request forgery (SSRF) by only dialing
+// out to known public IP prefixes, configurable with allows/blocks
+// - limit number of concurrent requests, else blocking until a slot
+// is available (context channels still respected)
type Client struct {
client http.Client
rc *requestQueue