some typo fix

This commit is contained in:
Notealot 2021-09-30 12:06:53 +08:00
parent 4d41a2f010
commit 7d84c45579
2 changed files with 4 additions and 4 deletions

View File

@ -2208,8 +2208,8 @@ IP can be trusted. They can be IPv4 addresses, IPv4 CIDRs, IPv6 addresses or
IPv6 CIDRs. IPv6 CIDRs.
**Attention:** Gin trust all proxies by default if you don't specify a trusted **Attention:** Gin trust all proxies by default if you don't specify a trusted
proxy using this function, **this is not safe**. At the same time, if you don't use proxy using the function above, **this is NOT safe**. At the same time, if you don't
any proxy, you can disable this feature by use `Engine.SetTrustedProxies(nil)`, use any proxy, you can disable this feature by using `Engine.SetTrustedProxies(nil)`,
then `Context.ClientIP()` will return the remote address directly to avoid some then `Context.ClientIP()` will return the remote address directly to avoid some
unnecessary computation. unnecessary computation.

4
gin.go
View File

@ -122,7 +122,7 @@ type Engine struct {
// List of headers used to obtain the client IP when // List of headers used to obtain the client IP when
// `(*gin.Engine).ForwardedByClientIP` is `true` and // `(*gin.Engine).ForwardedByClientIP` is `true` and
// `(*gin.Context).Request.RemoteAddr` is matched by at least one of the // `(*gin.Context).Request.RemoteAddr` is matched by at least one of the
// network origins of list set by `(*gin.Engine).SetTrustedProxies()`. // network origins of list defined by `(*gin.Engine).SetTrustedProxies()`.
RemoteIPHeaders []string RemoteIPHeaders []string
// If set to a constant of value gin.Platform*, trusts the headers set by // If set to a constant of value gin.Platform*, trusts the headers set by
@ -393,7 +393,7 @@ func (engine *Engine) SetTrustedProxies(trustedProxies []string) error {
return engine.parseTrustedProxies() return engine.parseTrustedProxies()
} }
// isUnsafeTrustedProxies equals Engine.trustedCIDRs and defaultTrustedCIDRs, it's not safe if true // isUnsafeTrustedProxies compares Engine.trustedCIDRs and defaultTrustedCIDRs, it's not safe if equal (returns true)
func (engine *Engine) isUnsafeTrustedProxies() bool { func (engine *Engine) isUnsafeTrustedProxies() bool {
return reflect.DeepEqual(engine.trustedCIDRs, defaultTrustedCIDRs) return reflect.DeepEqual(engine.trustedCIDRs, defaultTrustedCIDRs)
} }