Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

network: enforce maximum header size on outgoing ws conns #5268

Merged
merged 8 commits into from Apr 18, 2023

Conversation

iansuvak
Copy link
Contributor

@iansuvak iansuvak commented Apr 6, 2023

Summary

Enforce explicit max header size in the initial upgrader HTTP response when making an outgoing websocket connection

Test Plan

  • Should pass existing tests
  • Add a new test that ensures that the limits are being enforced correctly

@algorandskiy algorandskiy changed the title enhance: enforce maximum header size on outgoing ws conns network: enforce maximum header size on outgoing ws conns Apr 6, 2023
go.mod Show resolved Hide resolved
network/wsNetwork_test.go Show resolved Hide resolved
network/wsNetwork.go Outdated Show resolved Hide resolved
iansuvak and others added 2 commits April 13, 2023 15:07
Co-authored-by: Shant Karakashian <55754073+algonautshant@users.noreply.github.com>
algorandskiy
algorandskiy previously approved these changes Apr 18, 2023
algonautshant
algonautshant previously approved these changes Apr 18, 2023
Copy link
Contributor

@algonautshant algonautshant left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. Thanks for the updates.

@algorandskiy algorandskiy merged commit 15bc838 into algorand:master Apr 18, 2023
22 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants