mirror of
https://github.com/MODSetter/SurfSense.git
synced 2026-05-17 18:35:19 +02:00
chore: ran both frontend and backend linting
This commit is contained in:
parent
45489423d1
commit
645e849d93
21 changed files with 148 additions and 155 deletions
|
|
@ -109,14 +109,14 @@ class GoogleCalendarConnector:
|
|||
raise RuntimeError(
|
||||
"GOOGLE_CALENDAR_CONNECTOR connector not found; cannot persist refreshed token."
|
||||
)
|
||||
|
||||
|
||||
# Encrypt sensitive credentials before storing
|
||||
from app.config import config
|
||||
from app.utils.oauth_security import TokenEncryption
|
||||
|
||||
|
||||
creds_dict = json.loads(self._credentials.to_json())
|
||||
token_encrypted = connector.config.get("_token_encrypted", False)
|
||||
|
||||
|
||||
if token_encrypted and config.SECRET_KEY:
|
||||
token_encryption = TokenEncryption(config.SECRET_KEY)
|
||||
# Encrypt sensitive fields
|
||||
|
|
@ -125,15 +125,19 @@ class GoogleCalendarConnector:
|
|||
creds_dict["token"]
|
||||
)
|
||||
if creds_dict.get("refresh_token"):
|
||||
creds_dict["refresh_token"] = token_encryption.encrypt_token(
|
||||
creds_dict["refresh_token"]
|
||||
creds_dict["refresh_token"] = (
|
||||
token_encryption.encrypt_token(
|
||||
creds_dict["refresh_token"]
|
||||
)
|
||||
)
|
||||
if creds_dict.get("client_secret"):
|
||||
creds_dict["client_secret"] = token_encryption.encrypt_token(
|
||||
creds_dict["client_secret"]
|
||||
creds_dict["client_secret"] = (
|
||||
token_encryption.encrypt_token(
|
||||
creds_dict["client_secret"]
|
||||
)
|
||||
)
|
||||
creds_dict["_token_encrypted"] = True
|
||||
|
||||
|
||||
connector.config = creds_dict
|
||||
flag_modified(connector, "config")
|
||||
await self._session.commit()
|
||||
|
|
@ -209,9 +213,15 @@ class GoogleCalendarConnector:
|
|||
try:
|
||||
# Validate date strings
|
||||
if not start_date or start_date.lower() in ("undefined", "null", "none"):
|
||||
return [], "Invalid start_date: must be a valid date string in YYYY-MM-DD format"
|
||||
return (
|
||||
[],
|
||||
"Invalid start_date: must be a valid date string in YYYY-MM-DD format",
|
||||
)
|
||||
if not end_date or end_date.lower() in ("undefined", "null", "none"):
|
||||
return [], "Invalid end_date: must be a valid date string in YYYY-MM-DD format"
|
||||
return (
|
||||
[],
|
||||
"Invalid end_date: must be a valid date string in YYYY-MM-DD format",
|
||||
)
|
||||
|
||||
service = await self._get_service()
|
||||
|
||||
|
|
|
|||
|
|
@ -43,14 +43,16 @@ async def get_valid_credentials(
|
|||
if not connector:
|
||||
raise ValueError(f"Connector {connector_id} not found")
|
||||
|
||||
config_data = connector.config.copy() # Work with a copy to avoid modifying original
|
||||
|
||||
config_data = (
|
||||
connector.config.copy()
|
||||
) # Work with a copy to avoid modifying original
|
||||
|
||||
# Decrypt credentials if they are encrypted
|
||||
token_encrypted = config_data.get("_token_encrypted", False)
|
||||
if token_encrypted and config.SECRET_KEY:
|
||||
try:
|
||||
token_encryption = TokenEncryption(config.SECRET_KEY)
|
||||
|
||||
|
||||
# Decrypt sensitive fields
|
||||
if config_data.get("token"):
|
||||
config_data["token"] = token_encryption.decrypt_token(
|
||||
|
|
@ -64,7 +66,7 @@ async def get_valid_credentials(
|
|||
config_data["client_secret"] = token_encryption.decrypt_token(
|
||||
config_data["client_secret"]
|
||||
)
|
||||
|
||||
|
||||
logger.info(
|
||||
f"Decrypted Google Drive credentials for connector {connector_id}"
|
||||
)
|
||||
|
|
@ -104,10 +106,10 @@ async def get_valid_credentials(
|
|||
credentials.refresh(Request())
|
||||
|
||||
creds_dict = json.loads(credentials.to_json())
|
||||
|
||||
|
||||
# Encrypt sensitive credentials before storing
|
||||
token_encrypted = connector.config.get("_token_encrypted", False)
|
||||
|
||||
|
||||
if token_encrypted and config.SECRET_KEY:
|
||||
token_encryption = TokenEncryption(config.SECRET_KEY)
|
||||
# Encrypt sensitive fields
|
||||
|
|
@ -124,7 +126,7 @@ async def get_valid_credentials(
|
|||
creds_dict["client_secret"]
|
||||
)
|
||||
creds_dict["_token_encrypted"] = True
|
||||
|
||||
|
||||
connector.config = creds_dict
|
||||
flag_modified(connector, "config")
|
||||
await session.commit()
|
||||
|
|
|
|||
|
|
@ -44,9 +44,14 @@ class LinearConnector:
|
|||
ValueError: If no Linear access token has been set
|
||||
"""
|
||||
if not self.access_token:
|
||||
raise ValueError("Linear access token not initialized. Call set_token() first.")
|
||||
raise ValueError(
|
||||
"Linear access token not initialized. Call set_token() first."
|
||||
)
|
||||
|
||||
return {"Content-Type": "application/json", "Authorization": f"Bearer {self.access_token}"}
|
||||
return {
|
||||
"Content-Type": "application/json",
|
||||
"Authorization": f"Bearer {self.access_token}",
|
||||
}
|
||||
|
||||
def execute_graphql_query(
|
||||
self, query: str, variables: dict[str, Any] | None = None
|
||||
|
|
@ -66,7 +71,9 @@ class LinearConnector:
|
|||
Exception: If the API request fails
|
||||
"""
|
||||
if not self.access_token:
|
||||
raise ValueError("Linear access token not initialized. Call set_token() first.")
|
||||
raise ValueError(
|
||||
"Linear access token not initialized. Call set_token() first."
|
||||
)
|
||||
|
||||
headers = self.get_headers()
|
||||
payload = {"query": query}
|
||||
|
|
@ -174,9 +181,15 @@ class LinearConnector:
|
|||
"""
|
||||
# Validate date strings
|
||||
if not start_date or start_date.lower() in ("undefined", "null", "none"):
|
||||
return [], "Invalid start_date: must be a valid date string in YYYY-MM-DD format"
|
||||
return (
|
||||
[],
|
||||
"Invalid start_date: must be a valid date string in YYYY-MM-DD format",
|
||||
)
|
||||
if not end_date or end_date.lower() in ("undefined", "null", "none"):
|
||||
return [], "Invalid end_date: must be a valid date string in YYYY-MM-DD format"
|
||||
return (
|
||||
[],
|
||||
"Invalid end_date: must be a valid date string in YYYY-MM-DD format",
|
||||
)
|
||||
|
||||
# Convert date strings to ISO format
|
||||
try:
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue