Monorepo for Tangled tangled.org

appview/config: remove RateLimitBypass

Signed-off-by: oppiliappan <me@oppi.li>

oppi.li 1b314963 f4f91e72

verified
+7 -16
-1
appview/config/config.go
··· 17 17 AppviewName string `env:"APPVIEW_Name, default=Tangled"` 18 18 Dev bool `env:"DEV, default=false"` 19 19 DisallowedNicknamesFile string `env:"DISALLOWED_NICKNAMES_FILE"` 20 - RateLimitBypass string `env:"PDS_RATE_LIMIT_BYPASS"` 21 20 22 21 // temporarily, to add users to default knot and spindle 23 22 AppPassword string `env:"APP_PASSWORD"`
+6 -14
appview/oauth/handler.go
··· 247 247 248 248 // create a AppPasswordSession using apppasswords 249 249 type AppPasswordSession struct { 250 - AccessJwt string `json:"accessJwt"` 251 - PdsEndpoint string 252 - Did string 253 - RateLimitBypass string 254 - Logger *slog.Logger 250 + AccessJwt string `json:"accessJwt"` 251 + PdsEndpoint string 252 + Did string 253 + Logger *slog.Logger 255 254 } 256 255 257 - func CreateAppPasswordSession(res *idresolver.Resolver, appPassword, did, rateLimitBypass string, logger *slog.Logger) (*AppPasswordSession, error) { 256 + func CreateAppPasswordSession(res *idresolver.Resolver, appPassword, did string, logger *slog.Logger) (*AppPasswordSession, error) { 258 257 if appPassword == "" { 259 258 return nil, fmt.Errorf("no app password configured") 260 259 } ··· 284 283 return nil, fmt.Errorf("failed to create session request: %v", err) 285 284 } 286 285 sessionReq.Header.Set("Content-Type", "application/json") 287 - if rateLimitBypass != "" { 288 - sessionReq.Header.Set("x-ratelimit-bypass", rateLimitBypass) 289 - } 290 286 291 287 logger.Debug("creating app password session", "url", sessionURL, "headers", sessionReq.Header) 292 288 ··· 308 304 309 305 session.PdsEndpoint = pdsEndpoint 310 306 session.Did = did 311 - session.RateLimitBypass = rateLimitBypass 312 307 session.Logger = logger 313 308 314 309 return &session, nil ··· 340 335 341 336 req.Header.Set("Content-Type", "application/json") 342 337 req.Header.Set("Authorization", "Bearer "+s.AccessJwt) 343 - if s.RateLimitBypass != "" { 344 - req.Header.Set("x-ratelimit-bypass", s.RateLimitBypass) 345 - } 346 338 347 339 s.Logger.Debug("putting record", "url", url, "collection", collection, "headers", req.Header) 348 340 ··· 369 361 return o.appPasswordSession, nil 370 362 } 371 363 372 - session, err := CreateAppPasswordSession(o.IdResolver, o.Config.Core.AppPassword, consts.TangledDid, o.Config.Core.RateLimitBypass, o.Logger) 364 + session, err := CreateAppPasswordSession(o.IdResolver, o.Config.Core.AppPassword, consts.TangledDid, o.Logger) 373 365 if err != nil { 374 366 return nil, err 375 367 }
+1 -1
appview/state/state.go
··· 622 622 return 623 623 } 624 624 625 - session, err := oauth.CreateAppPasswordSession(res, config.Core.AppPassword, consts.TangledDid, config.Core.RateLimitBypass, logger) 625 + session, err := oauth.CreateAppPasswordSession(res, config.Core.AppPassword, consts.TangledDid, logger) 626 626 if err != nil { 627 627 logger.Error("failed to create appassword session... skipping fetch", "err", err) 628 628 return