Compare commits

..

1 Commits

Author SHA1 Message Date
989e99dc7e Update .github/workflows/release.yml
Some checks failed
Clippy check / clippy_check (push) Failing after 38s
2026-01-30 03:47:56 +01:00
4 changed files with 6 additions and 13 deletions

View File

@@ -114,7 +114,7 @@ jobs:
- uses: tauri-apps/tauri-action@v0 - uses: tauri-apps/tauri-action@v0
env: env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} GITHUB_TOKEN: ${{ secrets.RELEASE_TOKEN }}
APPLE_CERTIFICATE: ${{ secrets.APPLE_CERTIFICATE }} APPLE_CERTIFICATE: ${{ secrets.APPLE_CERTIFICATE }}
APPLE_CERTIFICATE_PASSWORD: ${{ secrets.APPLE_CERTIFICATE_PASSWORD }} APPLE_CERTIFICATE_PASSWORD: ${{ secrets.APPLE_CERTIFICATE_PASSWORD }}
APPLE_SIGNING_IDENTITY: ${{ env.CERT_ID }} APPLE_SIGNING_IDENTITY: ${{ env.CERT_ID }}

View File

@@ -453,7 +453,7 @@ impl ProcessManager<'_> {
#[cfg(target_os = "windows")] #[cfg(target_os = "windows")]
let mut command = Command::new("cmd"); let mut command = Command::new("cmd");
#[cfg(target_os = "windows")] #[cfg(target_os = "windows")]
command.raw_arg(format!("/C \"{}\"", &launch_parameters.0)); command.raw_arg(format!("/C \"{}\"", &launch_string));
info!( info!(
"launching (in {}): {}", "launching (in {}): {}",

View File

@@ -1,6 +1,6 @@
use database::borrow_db_checked; use database::borrow_db_checked;
use http::{ use http::{
HeaderMap, HeaderValue, Request, Response, StatusCode, Uri, header::{CONTENT_SECURITY_POLICY, USER_AGENT, X_FRAME_OPTIONS}, HeaderMap, HeaderValue, Request, Response, StatusCode, Uri, header::USER_AGENT,
}; };
use log::{error, warn}; use log::{error, warn};
use tauri::UriSchemeResponder; use tauri::UriSchemeResponder;
@@ -30,7 +30,7 @@ pub async fn handle_server_proto_wrapper(request: Request<Vec<u8>>, responder: U
match handle_server_proto(request).await { match handle_server_proto(request).await {
Ok(r) => responder.respond(r), Ok(r) => responder.respond(r),
Err(e) => { Err(e) => {
warn!("server proto error: {e}"); warn!("Cache error: {e}");
responder.respond( responder.respond(
Response::builder() Response::builder()
.status(e) .status(e)
@@ -84,13 +84,12 @@ async fn handle_server_proto(request: Request<Vec<u8>>) -> Result<Response<Vec<u
let response = match DROP_CLIENT_ASYNC let response = match DROP_CLIENT_ASYNC
.request(request.method().clone(), new_uri.to_string()) .request(request.method().clone(), new_uri.to_string())
.headers(headers) .headers(headers)
.body(request.body().clone()) // TODO: refactor this into a move
.send() .send()
.await .await
{ {
Ok(response) => response, Ok(response) => response,
Err(e) => { Err(e) => {
warn!("Could not send response. Got {e:?} when sending"); warn!("Could not send response. Got {e} when sending");
return Err(e.status().unwrap_or(StatusCode::BAD_REQUEST)); return Err(e.status().unwrap_or(StatusCode::BAD_REQUEST));
} }
}; };
@@ -103,12 +102,6 @@ async fn handle_server_proto(request: Request<Vec<u8>>) -> Result<Response<Vec<u
{ {
let client_response_headers = client_http_response.headers_mut().unwrap(); let client_response_headers = client_http_response.headers_mut().unwrap();
for (header, header_value) in response.headers() { for (header, header_value) in response.headers() {
if header == CONTENT_SECURITY_POLICY {
continue;
}
if header == X_FRAME_OPTIONS {
continue;
}
client_response_headers.insert(header, header_value.clone()); client_response_headers.insert(header, header_value.clone());
} }
}; };