Skip to content

Commit fa7fe65

Browse files
committed
fixup! feat: add DisableRateLimitCheck option to client
1 parent 04295fe commit fa7fe65

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ if errors.As(err, &rateError) {
219219
}
220220
```
221221

222-
To detect an API secondary rate limit error, you can check if the error is a
222+
To detect an API secondary rate limit error, you can check if the error is an
223223
`AbuseRateLimitError`.
224224

225225
```go

github/github.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1597,7 +1597,7 @@ that need to use a higher rate limit associated with your OAuth application.
15971597
This will add the client id and secret as a base64-encoded string in the format
15981598
ClientID:ClientSecret and apply it as an "Authorization": "Basic" header.
15991599
1600-
See http://docs.github.com/en/rest/using-the-rest-api/rate-limits-for-the-rest-api#primary-rate-limit-for-oauth-apps
1600+
See https://docs.github.com/en/rest/using-the-rest-api/rate-limits-for-the-rest-api#primary-rate-limit-for-oauth-apps
16011601
for more information.
16021602
*/
16031603
type UnauthenticatedRateLimitedTransport struct {

0 commit comments

Comments
 (0)