+1
-1
src/lib.rs
+1
-1
src/lib.rs
···
504
)
505
.fallback(async || (
506
StatusCode::NOT_IMPLEMENTED,
507
+
Json(json!({"error": "MethodNotImplemented", "message": "Method not implemented. For app.bsky.* methods, include an atproto-proxy header specifying your AppView."})),
508
));
509
let xrpc_service = ServiceBuilder::new()
510
.layer(XrpcProxyLayer::new(state.clone()))
+3
src/oauth/client.rs
+3
src/oauth/client.rs
···
82
.connect_timeout(std::time::Duration::from_secs(10))
83
.pool_max_idle_per_host(10)
84
.pool_idle_timeout(std::time::Duration::from_secs(90))
85
.build()
86
.unwrap_or_else(|_| Client::new()),
87
cache_ttl_secs,
···
256
.send()
257
.await
258
.map_err(|e| {
259
OAuthError::InvalidClient(format!("Failed to fetch client metadata: {}", e))
260
})?;
261
if !response.status().is_success() {
262
return Err(OAuthError::InvalidClient(format!(
263
"Failed to fetch client metadata: HTTP {}",
264
response.status()
···
82
.connect_timeout(std::time::Duration::from_secs(10))
83
.pool_max_idle_per_host(10)
84
.pool_idle_timeout(std::time::Duration::from_secs(90))
85
+
.user_agent("Tranquil-PDS/1.0 (ATProto; +https://tangled.org/lewis.moe/bspds-sandbox)")
86
.build()
87
.unwrap_or_else(|_| Client::new()),
88
cache_ttl_secs,
···
257
.send()
258
.await
259
.map_err(|e| {
260
+
tracing::warn!(client_id = %client_id, error = %e, "Failed to fetch client metadata");
261
OAuthError::InvalidClient(format!("Failed to fetch client metadata: {}", e))
262
})?;
263
if !response.status().is_success() {
264
+
tracing::warn!(client_id = %client_id, status = %response.status(), "Failed to fetch client metadata");
265
return Err(OAuthError::InvalidClient(format!(
266
"Failed to fetch client metadata: HTTP {}",
267
response.status()