-
-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support GitHub authorization token to bypass the unauthorized requests limit #102
Labels
enhancement
New feature or request
Comments
Closed
bump xD |
We could define a requests.Session and set the headers: s = requests.Session()
token = os.getenv('PROTONUP_GITHUB_AUTHORIZATION_TOKEN')
if token:
s.headers.update({'Authorization': f'token {token}'})
###
s.get(url='', stream=False) |
yep probably like that, but since |
DavidoTek
added a commit
that referenced
this issue
Aug 9, 2022
Should work now, feel free to do some testing! |
Sorry for late response, and yep it works flawlessly :P |
No problem, good to hear! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Is your feature request related to a problem? Please describe.
Continued from #95 (comment), tldr it's mostly useful for development & some rare cases (multiple application using GitHub API running, etc..) only.
Describe the solution you'd like
Support for an environment variable called
PROTONUP_GITHUB_AUTHORIZATION_TOKEN
, and read token from that variable.Describe alternatives you've considered
VPN to bypass, but using VPN is not really the right way to do.
Additional context
I can create a PR if you want :P
The text was updated successfully, but these errors were encountered: