Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Integration tests #2256

Merged
merged 26 commits into from
Sep 1, 2024
Merged

Integration tests #2256

merged 26 commits into from
Sep 1, 2024

Conversation

hagen-danswer
Copy link
Contributor

How Has This Been Tested?

Yes

Copy link

vercel bot commented Aug 28, 2024

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
internal-search ✅ Ready (Inspect) Visit Preview 💬 Add feedback Sep 1, 2024 9:43pm

set auth_type to basic and require_email_verification to false
@@ -67,23 +67,6 @@
logger = setup_logger()


Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

moved to another file

raise HTTPException(
status_code=401,
detail="Credential does not exist or does not belong to user",
detail=error_msg,
)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

need to look into long term fix for bubbling up failed api calls

@@ -157,11 +153,12 @@ def associate_credential_to_connector(
user: User | None = Depends(current_curator_or_admin_user),
db_session: Session = Depends(get_session),
) -> StatusResponse[int]:
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

used a more robust existing function to check

@@ -514,35 +514,6 @@ def _validate_connector_allowed(source: DocumentSource) -> None:
)


def _check_connector_permissions(
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

used a more robust existing function

@@ -48,9 +48,12 @@ class ConnectorBase(BaseModel):


class ConnectorUpdateRequest(ConnectorBase):
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should test this somehow maybe

@@ -261,6 +259,10 @@ class ConnectorCredentialPairMetadata(BaseModel):
groups: list[int] = Field(default_factory=list)


Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

???

Copy link
Contributor

@Weves Weves left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👩‍🎨

@Weves Weves added this pull request to the merge queue Sep 1, 2024
Merged via the queue into main with commit 8d443ad Sep 1, 2024
7 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants