-
-
Notifications
You must be signed in to change notification settings - Fork 1.9k
🧹 chore: Fix CORS docs and comments #3637
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Warning Rate limit exceeded@gaby has exceeded the limit for the number of commits or files that can be reviewed per hour. Please wait 23 minutes and 40 seconds before requesting another review. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. 📒 Files selected for processing (2)
✨ Finishing Touches
🧪 Generate unit tests
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
SupportNeed help? Create a ticket on our support page for assistance with any issues or questions. Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR fixes documentation inconsistencies and clarifies CORS configuration details in the Fiber framework. The changes improve accuracy and readability of the CORS middleware documentation.
- Clarified that wildcard origins cannot be used with credentials for security
- Fixed type definition and code example in documentation
- Improved explanation of Vary header behavior
Reviewed Changes
Copilot reviewed 2 out of 2 changed files in this pull request and generated 1 comment.
File | Description |
---|---|
middleware/cors/config.go | Updated comment to clarify wildcard origin restriction with credentials |
docs/middleware/cors.md | Fixed ExposeHeaders type, subdomain example syntax, and Vary header description |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Summary of Changes
Hello @gaby, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!
This pull request focuses on improving the accuracy and clarity of the CORS middleware documentation and its internal comments. It addresses several inaccuracies related to the ExposeHeaders
type, the correct usage of AllowOrigins
with credentials, and the precise behavior of the Vary
header, while also refining a code example for better understanding.
Highlights
- Documentation Accuracy: Corrected the documented type for
ExposeHeaders
in the CORS configuration table fromstring
to[]string
to accurately reflect its usage as a slice of strings. - Code Example Clarity: Updated the
AllowOrigins
code example for subdomain matching to correctly use a string slice ([]string
) instead of a single string, aligning with the expected configuration. - CORS Behavior Clarification: Enhanced the explanation of the
Vary
header's role in CORS, detailing its behavior for both simple and preflight requests to improve caching understanding and accuracy. - Security Comment Refinement: Clarified the internal comment for
AllowCredentials
inconfig.go
to explicitly state that the wildcard origin ("*"
) cannot be used with credentials, rather than implyingAllowOrigins
itself cannot betrue
.
Using Gemini Code Assist
The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.
Invoking Gemini
You can request assistance from Gemini at any point in your pull request via creating an issue comment (i.e. comment on the pull request page) using either /gemini <command>
or @gemini-code-assist <command>
. Below is a summary of the supported commands.
Feature | Command | Description |
---|---|---|
Code Review | /gemini review |
Performs a code review for the current pull request in its current state. |
Pull Request Summary | /gemini summary |
Provides a summary of the current pull request in its current state. |
Comment | @gemini-code-assist | Responds in comments when explicitly tagged, both in issue comments and review comments. |
Help | /gemini help |
Displays a list of available commands. |
Customization
To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/
folder in the base of the repository. Detailed instructions can be found here.
Limitations & Feedback
Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments or fill out our survey to provide feedback.
You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.
Footnotes
-
Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution. ↩
Co-authored-by: Copilot <[email protected]>
@sixcolors same with this one, just some small inconsistencies |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request provides several documentation and comment fixes for the CORS middleware. The changes clarify the use of wildcards with credentials, correct the type for ExposeHeaders
in the documentation, update an example to use a slice for AllowOrigins
, and improve the description of the Vary
header. The changes are generally good and improve clarity. I've pointed out one minor inaccuracy in the updated Vary
header description for further improvement.
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #3637 +/- ##
=======================================
Coverage 91.82% 91.82%
=======================================
Files 113 113
Lines 11426 11426
=======================================
Hits 10492 10492
Misses 671 671
Partials 263 263
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
Summary
ExposeHeaders
type in table