Merge pull request 'fix: remove token value from Bad Token log warnings (#79)' (#85) from issue/79-stop-logging-raw-auth-tokens-in-warning-messages into main
This commit is contained in:
commit
8e7466abd7
@ -106,7 +106,7 @@ async def patch_award(
|
||||
token: str = Depends(oauth2_scheme),
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_player - Bad Token: {token}")
|
||||
logger.warning("patch_player - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_award = Award.get_or_none(Award.id == award_id)
|
||||
@ -141,7 +141,7 @@ async def patch_award(
|
||||
@handle_db_errors
|
||||
async def post_award(award_list: AwardList, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_player - Bad Token: {token}")
|
||||
logger.warning("patch_player - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
new_awards = []
|
||||
@ -185,7 +185,7 @@ async def post_award(award_list: AwardList, token: str = Depends(oauth2_scheme))
|
||||
@handle_db_errors
|
||||
async def delete_award(award_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_player - Bad Token: {token}")
|
||||
logger.warning("patch_player - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_award = Award.get_or_none(Award.id == award_id)
|
||||
|
||||
@ -360,7 +360,7 @@ async def patch_batstats(
|
||||
stat_id: int, new_stats: BatStatModel, token: str = Depends(oauth2_scheme)
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_batstats - Bad Token: {token}")
|
||||
logger.warning("patch_batstats - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
if BattingStat.get_or_none(BattingStat.id == stat_id) is None:
|
||||
@ -377,7 +377,7 @@ async def patch_batstats(
|
||||
@handle_db_errors
|
||||
async def post_batstats(s_list: BatStatList, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_batstats - Bad Token: {token}")
|
||||
logger.warning("post_batstats - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
all_stats = []
|
||||
|
||||
@ -64,7 +64,7 @@ async def patch_current(
|
||||
token: str = Depends(oauth2_scheme),
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_current - Bad Token: {token}")
|
||||
logger.warning("patch_current - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
@ -110,7 +110,7 @@ async def patch_current(
|
||||
@handle_db_errors
|
||||
async def post_current(new_current: CurrentModel, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_current - Bad Token: {token}")
|
||||
logger.warning("patch_current - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_current = Current(**new_current.model_dump())
|
||||
@ -129,7 +129,7 @@ async def post_current(new_current: CurrentModel, token: str = Depends(oauth2_sc
|
||||
@handle_db_errors
|
||||
async def delete_current(current_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_current - Bad Token: {token}")
|
||||
logger.warning("patch_current - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
if Current.delete_by_id(current_id) == 1:
|
||||
|
||||
@ -375,7 +375,7 @@ async def create_custom_command_endpoint(
|
||||
):
|
||||
"""Create a new custom command"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"create_custom_command - Bad Token: {token}")
|
||||
logger.warning("create_custom_command - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
@ -436,7 +436,7 @@ async def update_custom_command_endpoint(
|
||||
):
|
||||
"""Update an existing custom command"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"update_custom_command - Bad Token: {token}")
|
||||
logger.warning("update_custom_command - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
@ -502,7 +502,7 @@ async def patch_custom_command(
|
||||
):
|
||||
"""Partially update a custom command"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_custom_command - Bad Token: {token}")
|
||||
logger.warning("patch_custom_command - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
@ -578,7 +578,7 @@ async def delete_custom_command_endpoint(
|
||||
):
|
||||
"""Delete a custom command"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_custom_command - Bad Token: {token}")
|
||||
logger.warning("delete_custom_command - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
@ -682,7 +682,7 @@ async def create_creator_endpoint(
|
||||
):
|
||||
"""Create a new command creator"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"create_creator - Bad Token: {token}")
|
||||
logger.warning("create_creator - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
@ -914,7 +914,7 @@ async def execute_custom_command(
|
||||
):
|
||||
"""Execute a custom command and update usage statistics"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"execute_custom_command - Bad Token: {token}")
|
||||
logger.warning("execute_custom_command - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
|
||||
@ -162,7 +162,7 @@ async def patch_decision(
|
||||
token: str = Depends(oauth2_scheme),
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_decision - Bad Token: {token}")
|
||||
logger.warning("patch_decision - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_dec = Decision.get_or_none(Decision.id == decision_id)
|
||||
@ -203,7 +203,7 @@ async def patch_decision(
|
||||
@handle_db_errors
|
||||
async def post_decisions(dec_list: DecisionList, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_decisions - Bad Token: {token}")
|
||||
logger.warning("post_decisions - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
new_dec = []
|
||||
@ -230,7 +230,7 @@ async def post_decisions(dec_list: DecisionList, token: str = Depends(oauth2_sch
|
||||
@handle_db_errors
|
||||
async def delete_decision(decision_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_decision - Bad Token: {token}")
|
||||
logger.warning("delete_decision - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_dec = Decision.get_or_none(Decision.id == decision_id)
|
||||
@ -253,7 +253,7 @@ async def delete_decision(decision_id: int, token: str = Depends(oauth2_scheme))
|
||||
@handle_db_errors
|
||||
async def delete_decisions_game(game_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_decisions_game - Bad Token: {token}")
|
||||
logger.warning("delete_decisions_game - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_game = StratGame.get_or_none(StratGame.id == game_id)
|
||||
|
||||
@ -82,7 +82,7 @@ async def patch_division(
|
||||
token: str = Depends(oauth2_scheme),
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_division - Bad Token: {token}")
|
||||
logger.warning("patch_division - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_div = Division.get_or_none(Division.id == division_id)
|
||||
@ -115,7 +115,7 @@ async def post_division(
|
||||
new_division: DivisionModel, token: str = Depends(oauth2_scheme)
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_division - Bad Token: {token}")
|
||||
logger.warning("post_division - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_division = Division(**new_division.model_dump())
|
||||
@ -131,7 +131,7 @@ async def post_division(
|
||||
@handle_db_errors
|
||||
async def delete_division(division_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_division - Bad Token: {token}")
|
||||
logger.warning("delete_division - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_div = Division.get_or_none(Division.id == division_id)
|
||||
|
||||
@ -44,7 +44,7 @@ async def patch_draftdata(
|
||||
pick_deadline: Optional[datetime.datetime] = None, result_channel: Optional[int] = None,
|
||||
ping_channel: Optional[int] = None, pick_minutes: Optional[int] = None, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f'patch_draftdata - Bad Token: {token}')
|
||||
logger.warning('patch_draftdata - Bad Token')
|
||||
raise HTTPException(status_code=401, detail='Unauthorized')
|
||||
|
||||
draft_data = DraftData.get_or_none(DraftData.id == data_id)
|
||||
|
||||
@ -40,7 +40,7 @@ async def get_draftlist(
|
||||
offset: int = Query(default=0, ge=0),
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"get_draftlist - Bad Token: {token}")
|
||||
logger.warning("get_draftlist - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
all_list = DraftList.select()
|
||||
@ -62,7 +62,7 @@ async def get_draftlist(
|
||||
@handle_db_errors
|
||||
async def get_team_draftlist(team_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_draftlist - Bad Token: {token}")
|
||||
logger.warning("post_draftlist - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_team = Team.get_or_none(Team.id == team_id)
|
||||
@ -84,7 +84,7 @@ async def post_draftlist(
|
||||
draft_list: DraftListList, token: str = Depends(oauth2_scheme)
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_draftlist - Bad Token: {token}")
|
||||
logger.warning("post_draftlist - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
new_list = []
|
||||
@ -111,7 +111,7 @@ async def post_draftlist(
|
||||
@handle_db_errors
|
||||
async def delete_draftlist(team_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_draftlist - Bad Token: {token}")
|
||||
logger.warning("delete_draftlist - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
count = DraftList.delete().where(DraftList.team_id == team_id).execute()
|
||||
|
||||
@ -144,7 +144,7 @@ async def patch_pick(
|
||||
pick_id: int, new_pick: DraftPickModel, token: str = Depends(oauth2_scheme)
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_pick - Bad Token: {token}")
|
||||
logger.warning("patch_pick - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
if DraftPick.get_or_none(DraftPick.id == pick_id) is None:
|
||||
@ -159,7 +159,7 @@ async def patch_pick(
|
||||
@handle_db_errors
|
||||
async def post_picks(p_list: DraftPickList, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_picks - Bad Token: {token}")
|
||||
logger.warning("post_picks - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
new_picks = []
|
||||
@ -186,7 +186,7 @@ async def post_picks(p_list: DraftPickList, token: str = Depends(oauth2_scheme))
|
||||
@handle_db_errors
|
||||
async def delete_pick(pick_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_pick - Bad Token: {token}")
|
||||
logger.warning("delete_pick - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_pick = DraftPick.get_or_none(DraftPick.id == pick_id)
|
||||
|
||||
@ -147,7 +147,7 @@ async def create_help_command_endpoint(
|
||||
):
|
||||
"""Create a new help command"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"create_help_command - Bad Token: {token}")
|
||||
logger.warning("create_help_command - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
@ -194,7 +194,7 @@ async def update_help_command_endpoint(
|
||||
):
|
||||
"""Update an existing help command"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"update_help_command - Bad Token: {token}")
|
||||
logger.warning("update_help_command - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
@ -243,7 +243,7 @@ async def restore_help_command_endpoint(
|
||||
):
|
||||
"""Restore a soft-deleted help command"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"restore_help_command - Bad Token: {token}")
|
||||
logger.warning("restore_help_command - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
@ -280,7 +280,7 @@ async def delete_help_command_endpoint(
|
||||
):
|
||||
"""Soft delete a help command"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_help_command - Bad Token: {token}")
|
||||
logger.warning("delete_help_command - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
@ -397,7 +397,7 @@ async def get_help_command_by_name_endpoint(
|
||||
async def increment_view_count(command_name: str, token: str = Depends(oauth2_scheme)):
|
||||
"""Increment view count for a help command"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"increment_view_count - Bad Token: {token}")
|
||||
logger.warning("increment_view_count - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
|
||||
@ -86,7 +86,7 @@ async def patch_injury(
|
||||
token: str = Depends(oauth2_scheme),
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_injury - Bad Token: {token}")
|
||||
logger.warning("patch_injury - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_injury = Injury.get_or_none(Injury.id == injury_id)
|
||||
@ -109,7 +109,7 @@ async def patch_injury(
|
||||
@handle_db_errors
|
||||
async def post_injury(new_injury: InjuryModel, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_injury - Bad Token: {token}")
|
||||
logger.warning("post_injury - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_injury = Injury(**new_injury.model_dump())
|
||||
@ -125,7 +125,7 @@ async def post_injury(new_injury: InjuryModel, token: str = Depends(oauth2_schem
|
||||
@handle_db_errors
|
||||
async def delete_injury(injury_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_injury - Bad Token: {token}")
|
||||
logger.warning("delete_injury - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_injury = Injury.get_or_none(Injury.id == injury_id)
|
||||
|
||||
@ -68,7 +68,7 @@ async def patch_keeper(
|
||||
token: str = Depends(oauth2_scheme),
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_keeper - Bad Token: {token}")
|
||||
logger.warning("patch_keeper - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_keeper = Keeper.get_or_none(Keeper.id == keeper_id)
|
||||
@ -95,7 +95,7 @@ async def patch_keeper(
|
||||
@handle_db_errors
|
||||
async def post_keepers(k_list: KeeperList, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_keepers - Bad Token: {token}")
|
||||
logger.warning("post_keepers - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
new_keepers = []
|
||||
@ -113,7 +113,7 @@ async def post_keepers(k_list: KeeperList, token: str = Depends(oauth2_scheme)):
|
||||
@handle_db_errors
|
||||
async def delete_keeper(keeper_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_keeper - Bad Token: {token}")
|
||||
logger.warning("delete_keeper - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_keeper = Keeper.get_or_none(Keeper.id == keeper_id)
|
||||
|
||||
@ -109,7 +109,7 @@ async def patch_manager(
|
||||
token: str = Depends(oauth2_scheme),
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_manager - Bad Token: {token}")
|
||||
logger.warning("patch_manager - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_manager = Manager.get_or_none(Manager.id == manager_id)
|
||||
@ -140,7 +140,7 @@ async def patch_manager(
|
||||
@handle_db_errors
|
||||
async def post_manager(new_manager: ManagerModel, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_manager - Bad Token: {token}")
|
||||
logger.warning("post_manager - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_manager = Manager(**new_manager.model_dump())
|
||||
@ -158,7 +158,7 @@ async def post_manager(new_manager: ManagerModel, token: str = Depends(oauth2_sc
|
||||
@handle_db_errors
|
||||
async def delete_manager(manager_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_manager - Bad Token: {token}")
|
||||
logger.warning("delete_manager - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_manager = Manager.get_or_none(Manager.id == manager_id)
|
||||
|
||||
@ -311,7 +311,7 @@ async def patch_pitstats(
|
||||
stat_id: int, new_stats: PitStatModel, token: str = Depends(oauth2_scheme)
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_pitstats - Bad Token: {token}")
|
||||
logger.warning("patch_pitstats - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
if PitchingStat.get_or_none(PitchingStat.id == stat_id) is None:
|
||||
@ -328,7 +328,7 @@ async def patch_pitstats(
|
||||
@handle_db_errors
|
||||
async def post_pitstats(s_list: PitStatList, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_pitstats - Bad Token: {token}")
|
||||
logger.warning("post_pitstats - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
all_stats = []
|
||||
|
||||
@ -114,7 +114,7 @@ async def patch_result(
|
||||
token: str = Depends(oauth2_scheme),
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_player - Bad Token: {token}")
|
||||
logger.warning("patch_player - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_result = Result.get_or_none(Result.id == result_id)
|
||||
@ -158,7 +158,7 @@ async def patch_result(
|
||||
@handle_db_errors
|
||||
async def post_results(result_list: ResultList, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_player - Bad Token: {token}")
|
||||
logger.warning("patch_player - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
new_results = []
|
||||
@ -196,7 +196,7 @@ async def post_results(result_list: ResultList, token: str = Depends(oauth2_sche
|
||||
@handle_db_errors
|
||||
async def delete_result(result_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_result - Bad Token: {token}")
|
||||
logger.warning("delete_result - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_result = Result.get_or_none(Result.id == result_id)
|
||||
|
||||
@ -140,7 +140,7 @@ async def patch_player(
|
||||
token: str = Depends(oauth2_scheme),
|
||||
):
|
||||
if not valid_token(token):
|
||||
logging.warning(f"Bad Token: {token}")
|
||||
logging.warning("Bad Token")
|
||||
raise HTTPException(
|
||||
status_code=401,
|
||||
detail="You are not authorized to patch mlb players. This event has been logged.",
|
||||
@ -179,7 +179,7 @@ async def patch_player(
|
||||
@handle_db_errors
|
||||
async def post_players(players: PlayerList, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logging.warning(f"Bad Token: {token}")
|
||||
logging.warning("Bad Token")
|
||||
raise HTTPException(
|
||||
status_code=401,
|
||||
detail="You are not authorized to post mlb players. This event has been logged.",
|
||||
@ -216,7 +216,7 @@ async def post_players(players: PlayerList, token: str = Depends(oauth2_scheme))
|
||||
@handle_db_errors
|
||||
async def post_one_player(player: SbaPlayerModel, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logging.warning(f"Bad Token: {token}")
|
||||
logging.warning("Bad Token")
|
||||
raise HTTPException(
|
||||
status_code=401,
|
||||
detail="You are not authorized to post mlb players. This event has been logged.",
|
||||
@ -252,7 +252,7 @@ async def post_one_player(player: SbaPlayerModel, token: str = Depends(oauth2_sc
|
||||
@handle_db_errors
|
||||
async def delete_player(player_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logging.warning(f"Bad Token: {token}")
|
||||
logging.warning("Bad Token")
|
||||
raise HTTPException(
|
||||
status_code=401,
|
||||
detail="You are not authorized to delete mlb players. This event has been logged.",
|
||||
|
||||
@ -106,7 +106,7 @@ async def patch_schedule(
|
||||
token: str = Depends(oauth2_scheme),
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_schedule - Bad Token: {token}")
|
||||
logger.warning("patch_schedule - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_sched = Schedule.get_or_none(Schedule.id == schedule_id)
|
||||
@ -143,7 +143,7 @@ async def patch_schedule(
|
||||
@handle_db_errors
|
||||
async def post_schedules(sched_list: ScheduleList, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_schedules - Bad Token: {token}")
|
||||
logger.warning("post_schedules - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
new_sched = []
|
||||
@ -181,7 +181,7 @@ async def post_schedules(sched_list: ScheduleList, token: str = Depends(oauth2_s
|
||||
@handle_db_errors
|
||||
async def delete_schedule(schedule_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_schedule - Bad Token: {token}")
|
||||
logger.warning("delete_schedule - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_sched = Schedule.get_or_none(Schedule.id == schedule_id)
|
||||
|
||||
@ -93,7 +93,7 @@ async def patch_standings(
|
||||
token: str = Depends(oauth2_scheme),
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_standings - Bad Token: {token}")
|
||||
logger.warning("patch_standings - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
try:
|
||||
@ -115,7 +115,7 @@ async def patch_standings(
|
||||
@handle_db_errors
|
||||
async def post_standings(season: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_standings - Bad Token: {token}")
|
||||
logger.warning("post_standings - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
new_teams = []
|
||||
@ -134,7 +134,7 @@ async def post_standings(season: int, token: str = Depends(oauth2_scheme)):
|
||||
@handle_db_errors
|
||||
async def recalculate_standings(season: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"recalculate_standings - Bad Token: {token}")
|
||||
logger.warning("recalculate_standings - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
code = Standings.recalculate(season)
|
||||
|
||||
@ -156,7 +156,7 @@ async def patch_game(
|
||||
scorecard_url: Optional[str] = None,
|
||||
) -> Any:
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_game - Bad Token: {token}")
|
||||
logger.warning("patch_game - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_game = StratGame.get_or_none(StratGame.id == game_id)
|
||||
@ -236,7 +236,7 @@ async def patch_game(
|
||||
@handle_db_errors
|
||||
async def post_games(game_list: GameList, token: str = Depends(oauth2_scheme)) -> Any:
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_games - Bad Token: {token}")
|
||||
logger.warning("post_games - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
new_games = []
|
||||
@ -263,7 +263,7 @@ async def post_games(game_list: GameList, token: str = Depends(oauth2_scheme)) -
|
||||
@handle_db_errors
|
||||
async def wipe_game(game_id: int, token: str = Depends(oauth2_scheme)) -> Any:
|
||||
if not valid_token(token):
|
||||
logger.warning(f"wipe_game - Bad Token: {token}")
|
||||
logger.warning("wipe_game - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_game = StratGame.get_or_none(StratGame.id == game_id)
|
||||
@ -287,7 +287,7 @@ async def wipe_game(game_id: int, token: str = Depends(oauth2_scheme)) -> Any:
|
||||
@handle_db_errors
|
||||
async def delete_game(game_id: int, token: str = Depends(oauth2_scheme)) -> Any:
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_game - Bad Token: {token}")
|
||||
logger.warning("delete_game - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_game = StratGame.get_or_none(StratGame.id == game_id)
|
||||
|
||||
@ -31,7 +31,7 @@ async def patch_play(
|
||||
play_id: int, new_play: PlayModel, token: str = Depends(oauth2_scheme)
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_play - Bad Token: {token}")
|
||||
logger.warning("patch_play - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
if StratPlay.get_or_none(StratPlay.id == play_id) is None:
|
||||
@ -46,7 +46,7 @@ async def patch_play(
|
||||
@handle_db_errors
|
||||
async def post_plays(p_list: PlayList, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_plays - Bad Token: {token}")
|
||||
logger.warning("post_plays - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
new_plays = []
|
||||
@ -97,7 +97,7 @@ async def post_plays(p_list: PlayList, token: str = Depends(oauth2_scheme)):
|
||||
@handle_db_errors
|
||||
async def delete_play(play_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_play - Bad Token: {token}")
|
||||
logger.warning("delete_play - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_play = StratPlay.get_or_none(StratPlay.id == play_id)
|
||||
@ -118,7 +118,7 @@ async def delete_play(play_id: int, token: str = Depends(oauth2_scheme)):
|
||||
@handle_db_errors
|
||||
async def delete_plays_game(game_id: int, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_plays_game - Bad Token: {token}")
|
||||
logger.warning("delete_plays_game - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
this_game = StratGame.get_or_none(StratGame.id == game_id)
|
||||
@ -139,7 +139,7 @@ async def delete_plays_game(game_id: int, token: str = Depends(oauth2_scheme)):
|
||||
@handle_db_errors
|
||||
async def post_erun_check(token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_erun_check - Bad Token: {token}")
|
||||
logger.warning("post_erun_check - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
all_plays = StratPlay.update(run=1).where(
|
||||
|
||||
@ -113,7 +113,7 @@ async def patch_transactions(
|
||||
cancelled: Optional[bool] = None,
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"patch_transactions - Bad Token: {token}")
|
||||
logger.warning("patch_transactions - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
these_moves = Transaction.select().where(Transaction.moveid == move_id)
|
||||
@ -138,7 +138,7 @@ async def post_transactions(
|
||||
moves: TransactionList, token: str = Depends(oauth2_scheme)
|
||||
):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"post_transactions - Bad Token: {token}")
|
||||
logger.warning("post_transactions - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
all_moves = []
|
||||
@ -185,7 +185,7 @@ async def post_transactions(
|
||||
@handle_db_errors
|
||||
async def delete_transactions(move_id, token: str = Depends(oauth2_scheme)):
|
||||
if not valid_token(token):
|
||||
logger.warning(f"delete_transactions - Bad Token: {token}")
|
||||
logger.warning("delete_transactions - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
delete_query = Transaction.delete().where(Transaction.moveid == move_id)
|
||||
|
||||
@ -124,7 +124,7 @@ async def refresh_season_batting_stats(
|
||||
Useful for full season updates.
|
||||
"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"refresh_season_batting_stats - Bad Token: {token}")
|
||||
logger.warning("refresh_season_batting_stats - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
logger.info(f"Refreshing all batting stats for season {season}")
|
||||
@ -270,7 +270,7 @@ async def refresh_season_pitching_stats(
|
||||
Private endpoint - not included in public API documentation.
|
||||
"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"refresh_season_batting_stats - Bad Token: {token}")
|
||||
logger.warning("refresh_season_batting_stats - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
logger.info(f"Refreshing season {season} pitching stats")
|
||||
@ -318,7 +318,7 @@ async def get_admin_cache_stats(token: str = Depends(oauth2_scheme)) -> dict:
|
||||
Private endpoint - requires authentication.
|
||||
"""
|
||||
if not valid_token(token):
|
||||
logger.warning(f"get_admin_cache_stats - Bad Token: {token}")
|
||||
logger.warning("get_admin_cache_stats - Bad Token")
|
||||
raise HTTPException(status_code=401, detail="Unauthorized")
|
||||
|
||||
logger.info("Getting cache statistics")
|
||||
|
||||
Loading…
Reference in New Issue
Block a user