mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-30 22:42:24 -05:00 
			
		
		
		
	[chore] update go dependencies (#4304)
- github.com/KimMachineGun/automemlimit v0.7.2 => v0.7.3
- github.com/gin-contrib/cors v1.7.5 => v1.7.6
- github.com/minio/minio-go/v7 v7.0.92 => v7.0.94
- github.com/spf13/cast v1.8.0 => v1.9.2
- github.com/uptrace/bun{,/*} v1.2.11 => v1.2.14
- golang.org/x/image v0.27.0 => v0.28.0
- golang.org/x/net v0.40.0 => v0.41.0
- code.superseriousbusiness.org/go-swagger v0.31.0-gts-go1.23-fix => v0.32.3-gts-go1.23-fix
Reviewed-on: https://codeberg.org/superseriousbusiness/gotosocial/pulls/4304
Co-authored-by: kim <grufwub@gmail.com>
Co-committed-by: kim <grufwub@gmail.com>
	
	
This commit is contained in:
		
					parent
					
						
							
								7712885038
							
						
					
				
			
			
				commit
				
					
						8b0ea56027
					
				
			
		
					 294 changed files with 139999 additions and 21873 deletions
				
			
		
							
								
								
									
										34
									
								
								vendor/google.golang.org/grpc/credentials/credentials.go
									
										
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										34
									
								
								vendor/google.golang.org/grpc/credentials/credentials.go
									
										
									
										generated
									
									
										vendored
									
									
								
							|  | @ -120,6 +120,20 @@ type AuthInfo interface { | |||
| 	AuthType() string | ||||
| } | ||||
| 
 | ||||
| // AuthorityValidator validates the authority used to override the `:authority` | ||||
| // header. This is an optional interface that implementations of AuthInfo can | ||||
| // implement if they support per-RPC authority overrides. It is invoked when the | ||||
| // application attempts to override the HTTP/2 `:authority` header using the | ||||
| // CallAuthority call option. | ||||
| type AuthorityValidator interface { | ||||
| 	// ValidateAuthority checks the authority value used to override the | ||||
| 	// `:authority` header. The authority parameter is the override value | ||||
| 	// provided by the application via the CallAuthority option. This value | ||||
| 	// typically corresponds to the server hostname or endpoint the RPC is | ||||
| 	// targeting. It returns non-nil error if the validation fails. | ||||
| 	ValidateAuthority(authority string) error | ||||
| } | ||||
| 
 | ||||
| // ErrConnDispatched indicates that rawConn has been dispatched out of gRPC | ||||
| // and the caller should not close rawConn. | ||||
| var ErrConnDispatched = errors.New("credentials: rawConn is dispatched out of gRPC") | ||||
|  | @ -207,14 +221,32 @@ type RequestInfo struct { | |||
| 	AuthInfo AuthInfo | ||||
| } | ||||
| 
 | ||||
| // requestInfoKey is a struct to be used as the key to store RequestInfo in a | ||||
| // context. | ||||
| type requestInfoKey struct{} | ||||
| 
 | ||||
| // RequestInfoFromContext extracts the RequestInfo from the context if it exists. | ||||
| // | ||||
| // This API is experimental. | ||||
| func RequestInfoFromContext(ctx context.Context) (ri RequestInfo, ok bool) { | ||||
| 	ri, ok = icredentials.RequestInfoFromContext(ctx).(RequestInfo) | ||||
| 	ri, ok = ctx.Value(requestInfoKey{}).(RequestInfo) | ||||
| 	return ri, ok | ||||
| } | ||||
| 
 | ||||
| // NewContextWithRequestInfo creates a new context from ctx and attaches ri to it. | ||||
| // | ||||
| // This RequestInfo will be accessible via RequestInfoFromContext. | ||||
| // | ||||
| // Intended to be used from tests for PerRPCCredentials implementations (that | ||||
| // often need to check connection's SecurityLevel). Should not be used from | ||||
| // non-test code: the gRPC client already prepares a context with the correct | ||||
| // RequestInfo attached when calling PerRPCCredentials.GetRequestMetadata. | ||||
| // | ||||
| // This API is experimental. | ||||
| func NewContextWithRequestInfo(ctx context.Context, ri RequestInfo) context.Context { | ||||
| 	return context.WithValue(ctx, requestInfoKey{}, ri) | ||||
| } | ||||
| 
 | ||||
| // ClientHandshakeInfo holds data to be passed to ClientHandshake. This makes | ||||
| // it possible to pass arbitrary data to the handshaker from gRPC, resolver, | ||||
| // balancer etc. Individual credential implementations control the actual | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue