fix(security): Fix unsafe code, CORS logic, and expect usage
This commit is contained in:
parent
d7211a6c19
commit
ac5b814536
3 changed files with 3 additions and 3 deletions
|
|
@ -199,7 +199,7 @@ pub async fn download_file(url: &str, output_path: &str) -> Result<(), anyhow::E
|
||||||
let pb = ProgressBar::new(total_size);
|
let pb = ProgressBar::new(total_size);
|
||||||
pb.set_style(ProgressStyle::default_bar()
|
pb.set_style(ProgressStyle::default_bar()
|
||||||
.template("{msg}\n{spinner:.green} [{elapsed_precise}] [{bar:40.cyan/blue}] {bytes}/{total_bytes} ({eta})")
|
.template("{msg}\n{spinner:.green} [{elapsed_precise}] [{bar:40.cyan/blue}] {bytes}/{total_bytes} ({eta})")
|
||||||
.expect("Invalid progress bar template")
|
.unwrap_or(ProgressStyle::default_bar())
|
||||||
.progress_chars("#>-"));
|
.progress_chars("#>-"));
|
||||||
pb.set_message(format!("Downloading {}", url));
|
pb.set_message(format!("Downloading {}", url));
|
||||||
let mut file = TokioFile::create(&output_path).await?;
|
let mut file = TokioFile::create(&output_path).await?;
|
||||||
|
|
|
||||||
|
|
@ -96,7 +96,7 @@ impl ApiRateLimiter {
|
||||||
pub fn new(limits: RateLimits) -> Self {
|
pub fn new(limits: RateLimits) -> Self {
|
||||||
// Requests per minute limiter
|
// Requests per minute limiter
|
||||||
let rpm_quota = NonZeroU32::new(limits.requests_per_minute)
|
let rpm_quota = NonZeroU32::new(limits.requests_per_minute)
|
||||||
.unwrap_or_else(|| unsafe { NonZeroU32::new_unchecked(1) });
|
.unwrap_or_else(|| NonZeroU32::new(1).unwrap());
|
||||||
let requests_per_minute = Arc::new(RateLimiter::direct(Quota::per_minute(rpm_quota)));
|
let requests_per_minute = Arc::new(RateLimiter::direct(Quota::per_minute(rpm_quota)));
|
||||||
|
|
||||||
// Tokens per minute (using semaphore as we need to track token count)
|
// Tokens per minute (using semaphore as we need to track token count)
|
||||||
|
|
|
||||||
|
|
@ -308,7 +308,7 @@ fn is_valid_origin_format(origin: &str) -> bool {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
if origin.contains("..") || origin.contains("//", ) && origin.matches("//").count() > 1 {
|
if origin.contains("..") || origin.matches("//").count() > 1 {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Reference in a new issue