@@ -116,15 +116,15 @@ Future<shelf.Response> handler(shelf.Request request) async {
116116 if (request.method != 'GET' ) {
117117 return shelf.Response .notFound (
118118 'Unsupported method' ,
119- headers: {... securityHeaders} ,
119+ headers: securityHeaders,
120120 );
121121 }
122122 final segments = request.url.pathSegments;
123123 if (segments.length != 3 ) {
124124 return shelf.Response .badRequest (
125125 body:
126126 'malformed request, ${segments .length } should be of the form <base64(hmac(url,daily_secret))>/<date>/<urlencode(url)>' ,
127- headers: {... securityHeaders} ,
127+ headers: securityHeaders,
128128 );
129129 }
130130 final Uint8List signature;
@@ -133,29 +133,29 @@ Future<shelf.Response> handler(shelf.Request request) async {
133133 } on FormatException catch (_) {
134134 return shelf.Response .badRequest (
135135 body: 'malformed request, could not decode mac signature' ,
136- headers: {... securityHeaders} ,
136+ headers: securityHeaders,
137137 );
138138 }
139139 final date = int .tryParse (segments[1 ]);
140140 if (date == null ) {
141141 return shelf.Response .badRequest (
142142 body: 'malformed request, missing date' ,
143- headers: {... securityHeaders} ,
143+ headers: securityHeaders,
144144 );
145145 }
146146 final secret = allowedKeys[date];
147147 if (secret == null ) {
148148 return shelf.Response .badRequest (
149149 body: 'malformed request, proxy url expired' ,
150- headers: {... securityHeaders} ,
150+ headers: securityHeaders,
151151 );
152152 }
153153
154154 final imageUrl = segments[2 ];
155155 if (imageUrl.length > 1024 ) {
156156 return shelf.Response .badRequest (
157157 body: 'proxied url too long' ,
158- headers: {... securityHeaders} ,
158+ headers: securityHeaders,
159159 );
160160 }
161161 final imageUrlBytes = utf8.encode (imageUrl);
@@ -167,20 +167,20 @@ Future<shelf.Response> handler(shelf.Request request) async {
167167 } on FormatException catch (e) {
168168 return shelf.Response .badRequest (
169169 body: 'Malformed proxied url $e ' ,
170- headers: {... securityHeaders} ,
170+ headers: securityHeaders,
171171 );
172172 }
173173 if (! (parsedImageUrl.isScheme ('http' ) ||
174174 parsedImageUrl.isScheme ('https' ))) {
175175 return shelf.Response .badRequest (
176176 body: 'Can only proxy http and https urls' ,
177- headers: {... securityHeaders} ,
177+ headers: securityHeaders,
178178 );
179179 }
180180 if (! parsedImageUrl.isAbsolute) {
181181 return shelf.Response .badRequest (
182182 body: 'Can only proxy absolute urls' ,
183- headers: {... securityHeaders} ,
183+ headers: securityHeaders,
184184 );
185185 }
186186
@@ -264,22 +264,22 @@ Future<shelf.Response> handler(shelf.Request request) async {
264264 } on TooLargeException {
265265 return shelf.Response .badRequest (
266266 body: 'Image too large' ,
267- headers: {... securityHeaders} ,
267+ headers: securityHeaders,
268268 );
269269 } on RedirectException catch (e) {
270270 return shelf.Response .badRequest (
271271 body: e.message,
272- headers: {... securityHeaders} ,
272+ headers: securityHeaders,
273273 );
274274 } on RequestTimeoutException catch (e) {
275275 return shelf.Response .badRequest (
276276 body: e.message,
277- headers: {... securityHeaders} ,
277+ headers: securityHeaders,
278278 );
279279 } on ServerSideException catch (e) {
280280 return shelf.Response .badRequest (
281281 body: 'Failed to retrieve image. Status code ${e .statusCode }' ,
282- headers: {... securityHeaders} ,
282+ headers: securityHeaders,
283283 );
284284 }
285285
@@ -294,10 +294,7 @@ Future<shelf.Response> handler(shelf.Request request) async {
294294 },
295295 );
296296 } else {
297- return shelf.Response .unauthorized (
298- 'Bad hmac' ,
299- headers: {...securityHeaders},
300- );
297+ return shelf.Response .unauthorized ('Bad hmac' , headers: securityHeaders);
301298 }
302299 } catch (e, st) {
303300 stderr.writeln ('Uncaught error: $e $st ' );
0 commit comments