+5
-1
src/internal/xrpc.zig
+5
-1
src/internal/xrpc.zig
···
86
defer aw.deinit();
87
88
// build extra headers for auth
89
-
var extra_headers: std.http.Client.Request.Headers = .{};
90
var auth_header_buf: [256]u8 = undefined;
91
if (self.access_token) |token| {
92
const auth_value = try std.fmt.bufPrint(&auth_header_buf, "Bearer {s}", .{token});
···
159
try std.testing.expect(std.mem.startsWith(u8, url, "https://bsky.social/xrpc/app.bsky.actor.getProfile?"));
160
try std.testing.expect(std.mem.indexOf(u8, url, "actor=did%3Aplc%3Atest123") != null);
161
}
···
86
defer aw.deinit();
87
88
// build extra headers for auth
89
+
// disable gzip to work around deflate decompressor panic on x86_64-linux
90
+
var extra_headers: std.http.Client.Request.Headers = .{
91
+
.accept_encoding = .{ .override = "identity" },
92
+
};
93
var auth_header_buf: [256]u8 = undefined;
94
if (self.access_token) |token| {
95
const auth_value = try std.fmt.bufPrint(&auth_header_buf, "Bearer {s}", .{token});
···
162
try std.testing.expect(std.mem.startsWith(u8, url, "https://bsky.social/xrpc/app.bsky.actor.getProfile?"));
163
try std.testing.expect(std.mem.indexOf(u8, url, "actor=did%3Aplc%3Atest123") != null);
164
}
165
+