Skip to content

Commit f0feb09

Browse files
fix: pass Impersonate option to extractor HTTP client (#37)
The `Impersonate` field from extractor config was not being forwarded to `NewHTTPClientOptions` when building the extractor context in `FromURL()`. This meant that even when `impersonate: true` was set in the extractor YAML configuration, the HTTP client would never call `NewChromeClient()`, effectively making TLS fingerprint impersonation a no-op for all extractors. This one-liner adds the missing field passthrough, aligning `Impersonate` with the other options (`Proxy`, `DisableProxy`, etc.) that are already forwarded correctly. Co-authored-by: eagle1maledetto <eagle1maledetto@users.noreply.github.com>
1 parent 8f5a693 commit f0feb09

1 file changed

Lines changed: 1 addition & 0 deletions

File tree

internal/extractors/util.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,7 @@ func FromURL(url string) *models.ExtractorContext {
8888
DownloadProxy: cfg.DownloadProxy,
8989
Proxy: cfg.Proxy,
9090
DisableProxy: cfg.DisableProxy,
91+
Impersonate: cfg.Impersonate,
9192
},
9293
),
9394
}

0 commit comments

Comments
 (0)