diff options
| author | Mohamed Bassem <me@mbassem.com> | 2026-01-02 23:50:43 +0000 |
|---|---|---|
| committer | Mohamed Bassem <me@mbassem.com> | 2026-01-02 23:50:43 +0000 |
| commit | 1af9b9ddf69cc7215d10e2f0713123756b36077b (patch) | |
| tree | a641cdc02643f1119ee64dcd1a64aed4956716b6 /apps/workers | |
| parent | 0250d163a4aa38b88831889509298818e3be422c (diff) | |
| download | karakeep-1af9b9ddf69cc7215d10e2f0713123756b36077b.tar.zst | |
chore: add a note about hostname allowlists in the validation error message
Diffstat (limited to 'apps/workers')
| -rw-r--r-- | apps/workers/network.ts | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/apps/workers/network.ts b/apps/workers/network.ts index 0dc46da4..4bc30562 100644 --- a/apps/workers/network.ts +++ b/apps/workers/network.ts @@ -163,7 +163,7 @@ export async function validateUrl( if (isAddressForbidden(hostname)) { return { ok: false, - reason: `Refusing to access disallowed IP address ${hostname} (requested via ${parsedUrl.toString()})`, + reason: `Refusing to access disallowed IP address ${hostname} (requested via ${parsedUrl.toString()}). You can use CRAWLER_ALLOWED_INTERNAL_HOSTNAMES to allowlist specific hostnames for internal access.`, } as const; } return { ok: true, url: parsedUrl } as const; |
