From d06db9a9bb2b86fcbc268fde6a424d5736c00d39 Mon Sep 17 00:00:00 2001 From: Cal Corum Date: Thu, 26 Mar 2026 23:32:43 -0500 Subject: [PATCH] fix: remove token value from Bad Token log warnings (#79) Closes #79 Co-Authored-By: Claude Sonnet 4.6 --- app/routers_v3/awards.py | 6 +++--- app/routers_v3/battingstats.py | 4 ++-- app/routers_v3/current.py | 6 +++--- app/routers_v3/custom_commands.py | 12 ++++++------ app/routers_v3/decisions.py | 8 ++++---- app/routers_v3/divisions.py | 6 +++--- app/routers_v3/draftdata.py | 2 +- app/routers_v3/draftlist.py | 8 ++++---- app/routers_v3/draftpicks.py | 6 +++--- app/routers_v3/help_commands.py | 10 +++++----- app/routers_v3/injuries.py | 6 +++--- app/routers_v3/keepers.py | 6 +++--- app/routers_v3/managers.py | 6 +++--- app/routers_v3/pitchingstats.py | 4 ++-- app/routers_v3/results.py | 6 +++--- app/routers_v3/sbaplayers.py | 8 ++++---- app/routers_v3/schedules.py | 6 +++--- app/routers_v3/standings.py | 6 +++--- app/routers_v3/stratgame.py | 8 ++++---- app/routers_v3/stratplay/crud.py | 10 +++++----- app/routers_v3/transactions.py | 6 +++--- app/routers_v3/views.py | 6 +++--- 22 files changed, 73 insertions(+), 73 deletions(-) diff --git a/app/routers_v3/awards.py b/app/routers_v3/awards.py index 575ef42..37344b6 100644 --- a/app/routers_v3/awards.py +++ b/app/routers_v3/awards.py @@ -102,7 +102,7 @@ async def patch_award( token: str = Depends(oauth2_scheme), ): if not valid_token(token): - logger.warning(f"patch_player - Bad Token: {token}") + logger.warning("patch_player - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_award = Award.get_or_none(Award.id == award_id) @@ -140,7 +140,7 @@ async def patch_award( @handle_db_errors async def post_award(award_list: AwardList, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"patch_player - Bad Token: {token}") + logger.warning("patch_player - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") new_awards = [] @@ -185,7 +185,7 @@ async def post_award(award_list: AwardList, token: str = Depends(oauth2_scheme)) @handle_db_errors async def delete_award(award_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"patch_player - Bad Token: {token}") + logger.warning("patch_player - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_award = Award.get_or_none(Award.id == award_id) diff --git a/app/routers_v3/battingstats.py b/app/routers_v3/battingstats.py index 49d3fa8..2ca9190 100644 --- a/app/routers_v3/battingstats.py +++ b/app/routers_v3/battingstats.py @@ -360,7 +360,7 @@ async def patch_batstats( stat_id: int, new_stats: BatStatModel, token: str = Depends(oauth2_scheme) ): if not valid_token(token): - logger.warning(f"patch_batstats - Bad Token: {token}") + logger.warning("patch_batstats - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") if BattingStat.get_or_none(BattingStat.id == stat_id) is None: @@ -376,7 +376,7 @@ async def patch_batstats( @handle_db_errors async def post_batstats(s_list: BatStatList, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"post_batstats - Bad Token: {token}") + logger.warning("post_batstats - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") all_stats = [] diff --git a/app/routers_v3/current.py b/app/routers_v3/current.py index ba4458f..e7df729 100644 --- a/app/routers_v3/current.py +++ b/app/routers_v3/current.py @@ -65,7 +65,7 @@ async def patch_current( token: str = Depends(oauth2_scheme), ): if not valid_token(token): - logger.warning(f"patch_current - Bad Token: {token}") + logger.warning("patch_current - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: @@ -113,7 +113,7 @@ async def patch_current( @handle_db_errors async def post_current(new_current: CurrentModel, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"patch_current - Bad Token: {token}") + logger.warning("patch_current - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_current = Current(**new_current.dict()) @@ -134,7 +134,7 @@ async def post_current(new_current: CurrentModel, token: str = Depends(oauth2_sc @handle_db_errors async def delete_current(current_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"patch_current - Bad Token: {token}") + logger.warning("patch_current - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") if Current.delete_by_id(current_id) == 1: diff --git a/app/routers_v3/custom_commands.py b/app/routers_v3/custom_commands.py index 577e78d..4d32a86 100644 --- a/app/routers_v3/custom_commands.py +++ b/app/routers_v3/custom_commands.py @@ -377,7 +377,7 @@ async def create_custom_command_endpoint( ): """Create a new custom command""" if not valid_token(token): - logger.warning(f"create_custom_command - Bad Token: {token}") + logger.warning("create_custom_command - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: @@ -440,7 +440,7 @@ async def update_custom_command_endpoint( ): """Update an existing custom command""" if not valid_token(token): - logger.warning(f"update_custom_command - Bad Token: {token}") + logger.warning("update_custom_command - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: @@ -508,7 +508,7 @@ async def patch_custom_command( ): """Partially update a custom command""" if not valid_token(token): - logger.warning(f"patch_custom_command - Bad Token: {token}") + logger.warning("patch_custom_command - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: @@ -586,7 +586,7 @@ async def delete_custom_command_endpoint( ): """Delete a custom command""" if not valid_token(token): - logger.warning(f"delete_custom_command - Bad Token: {token}") + logger.warning("delete_custom_command - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: @@ -694,7 +694,7 @@ async def create_creator_endpoint( ): """Create a new command creator""" if not valid_token(token): - logger.warning(f"create_creator - Bad Token: {token}") + logger.warning("create_creator - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: @@ -932,7 +932,7 @@ async def execute_custom_command( ): """Execute a custom command and update usage statistics""" if not valid_token(token): - logger.warning(f"execute_custom_command - Bad Token: {token}") + logger.warning("execute_custom_command - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: diff --git a/app/routers_v3/decisions.py b/app/routers_v3/decisions.py index a59b16f..6a08bf1 100644 --- a/app/routers_v3/decisions.py +++ b/app/routers_v3/decisions.py @@ -164,7 +164,7 @@ async def patch_decision( token: str = Depends(oauth2_scheme), ): if not valid_token(token): - logger.warning(f"patch_decision - Bad Token: {token}") + logger.warning("patch_decision - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_dec = Decision.get_or_none(Decision.id == decision_id) @@ -208,7 +208,7 @@ async def patch_decision( @handle_db_errors async def post_decisions(dec_list: DecisionList, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"post_decisions - Bad Token: {token}") + logger.warning("post_decisions - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") new_dec = [] @@ -236,7 +236,7 @@ async def post_decisions(dec_list: DecisionList, token: str = Depends(oauth2_sch @handle_db_errors async def delete_decision(decision_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_decision - Bad Token: {token}") + logger.warning("delete_decision - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_dec = Decision.get_or_none(Decision.id == decision_id) @@ -261,7 +261,7 @@ async def delete_decision(decision_id: int, token: str = Depends(oauth2_scheme)) @handle_db_errors async def delete_decisions_game(game_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_decisions_game - Bad Token: {token}") + logger.warning("delete_decisions_game - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_game = StratGame.get_or_none(StratGame.id == game_id) diff --git a/app/routers_v3/divisions.py b/app/routers_v3/divisions.py index 095662a..d98ed23 100644 --- a/app/routers_v3/divisions.py +++ b/app/routers_v3/divisions.py @@ -78,7 +78,7 @@ async def patch_division( token: str = Depends(oauth2_scheme), ): if not valid_token(token): - logger.warning(f"patch_division - Bad Token: {token}") + logger.warning("patch_division - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_div = Division.get_or_none(Division.id == division_id) @@ -114,7 +114,7 @@ async def post_division( new_division: DivisionModel, token: str = Depends(oauth2_scheme) ): if not valid_token(token): - logger.warning(f"post_division - Bad Token: {token}") + logger.warning("post_division - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_division = Division(**new_division.dict()) @@ -132,7 +132,7 @@ async def post_division( @handle_db_errors async def delete_division(division_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_division - Bad Token: {token}") + logger.warning("delete_division - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_div = Division.get_or_none(Division.id == division_id) diff --git a/app/routers_v3/draftdata.py b/app/routers_v3/draftdata.py index 1329fb9..2ed6903 100644 --- a/app/routers_v3/draftdata.py +++ b/app/routers_v3/draftdata.py @@ -45,7 +45,7 @@ async def patch_draftdata( pick_deadline: Optional[datetime.datetime] = None, result_channel: Optional[int] = None, ping_channel: Optional[int] = None, pick_minutes: Optional[int] = None, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f'patch_draftdata - Bad Token: {token}') + logger.warning('patch_draftdata - Bad Token') raise HTTPException(status_code=401, detail='Unauthorized') draft_data = DraftData.get_or_none(DraftData.id == data_id) diff --git a/app/routers_v3/draftlist.py b/app/routers_v3/draftlist.py index 4de0d7c..cbe9ff9 100644 --- a/app/routers_v3/draftlist.py +++ b/app/routers_v3/draftlist.py @@ -36,7 +36,7 @@ async def get_draftlist( token: str = Depends(oauth2_scheme), ): if not valid_token(token): - logger.warning(f"get_draftlist - Bad Token: {token}") + logger.warning("get_draftlist - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") all_list = DraftList.select() @@ -56,7 +56,7 @@ async def get_draftlist( @handle_db_errors async def get_team_draftlist(team_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"post_draftlist - Bad Token: {token}") + logger.warning("post_draftlist - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_team = Team.get_or_none(Team.id == team_id) @@ -79,7 +79,7 @@ async def post_draftlist( draft_list: DraftListList, token: str = Depends(oauth2_scheme) ): if not valid_token(token): - logger.warning(f"post_draftlist - Bad Token: {token}") + logger.warning("post_draftlist - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") new_list = [] @@ -107,7 +107,7 @@ async def post_draftlist( @handle_db_errors async def delete_draftlist(team_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_draftlist - Bad Token: {token}") + logger.warning("delete_draftlist - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") count = DraftList.delete().where(DraftList.team_id == team_id).execute() diff --git a/app/routers_v3/draftpicks.py b/app/routers_v3/draftpicks.py index 2214aa3..2390085 100644 --- a/app/routers_v3/draftpicks.py +++ b/app/routers_v3/draftpicks.py @@ -145,7 +145,7 @@ async def patch_pick( pick_id: int, new_pick: DraftPickModel, token: str = Depends(oauth2_scheme) ): if not valid_token(token): - logger.warning(f"patch_pick - Bad Token: {token}") + logger.warning("patch_pick - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") if DraftPick.get_or_none(DraftPick.id == pick_id) is None: @@ -161,7 +161,7 @@ async def patch_pick( @handle_db_errors async def post_picks(p_list: DraftPickList, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"post_picks - Bad Token: {token}") + logger.warning("post_picks - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") new_picks = [] @@ -190,7 +190,7 @@ async def post_picks(p_list: DraftPickList, token: str = Depends(oauth2_scheme)) @handle_db_errors async def delete_pick(pick_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_pick - Bad Token: {token}") + logger.warning("delete_pick - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_pick = DraftPick.get_or_none(DraftPick.id == pick_id) diff --git a/app/routers_v3/help_commands.py b/app/routers_v3/help_commands.py index 6d757c7..3205731 100644 --- a/app/routers_v3/help_commands.py +++ b/app/routers_v3/help_commands.py @@ -149,7 +149,7 @@ async def create_help_command_endpoint( ): """Create a new help command""" if not valid_token(token): - logger.warning(f"create_help_command - Bad Token: {token}") + logger.warning("create_help_command - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: @@ -198,7 +198,7 @@ async def update_help_command_endpoint( ): """Update an existing help command""" if not valid_token(token): - logger.warning(f"update_help_command - Bad Token: {token}") + logger.warning("update_help_command - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: @@ -249,7 +249,7 @@ async def restore_help_command_endpoint( ): """Restore a soft-deleted help command""" if not valid_token(token): - logger.warning(f"restore_help_command - Bad Token: {token}") + logger.warning("restore_help_command - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: @@ -288,7 +288,7 @@ async def delete_help_command_endpoint( ): """Soft delete a help command""" if not valid_token(token): - logger.warning(f"delete_help_command - Bad Token: {token}") + logger.warning("delete_help_command - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: @@ -411,7 +411,7 @@ async def get_help_command_by_name_endpoint( async def increment_view_count(command_name: str, token: str = Depends(oauth2_scheme)): """Increment view count for a help command""" if not valid_token(token): - logger.warning(f"increment_view_count - Bad Token: {token}") + logger.warning("increment_view_count - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: diff --git a/app/routers_v3/injuries.py b/app/routers_v3/injuries.py index 77984eb..18f07c7 100644 --- a/app/routers_v3/injuries.py +++ b/app/routers_v3/injuries.py @@ -80,7 +80,7 @@ async def patch_injury( token: str = Depends(oauth2_scheme), ): if not valid_token(token): - logger.warning(f"patch_injury - Bad Token: {token}") + logger.warning("patch_injury - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_injury = Injury.get_or_none(Injury.id == injury_id) @@ -106,7 +106,7 @@ async def patch_injury( @handle_db_errors async def post_injury(new_injury: InjuryModel, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"post_injury - Bad Token: {token}") + logger.warning("post_injury - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_injury = Injury(**new_injury.dict()) @@ -124,7 +124,7 @@ async def post_injury(new_injury: InjuryModel, token: str = Depends(oauth2_schem @handle_db_errors async def delete_injury(injury_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_injury - Bad Token: {token}") + logger.warning("delete_injury - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_injury = Injury.get_or_none(Injury.id == injury_id) diff --git a/app/routers_v3/keepers.py b/app/routers_v3/keepers.py index d0fafcf..10f4408 100644 --- a/app/routers_v3/keepers.py +++ b/app/routers_v3/keepers.py @@ -62,7 +62,7 @@ async def patch_keeper( token: str = Depends(oauth2_scheme), ): if not valid_token(token): - logger.warning(f"patch_keeper - Bad Token: {token}") + logger.warning("patch_keeper - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_keeper = Keeper.get_or_none(Keeper.id == keeper_id) @@ -91,7 +91,7 @@ async def patch_keeper( @handle_db_errors async def post_keepers(k_list: KeeperList, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"post_keepers - Bad Token: {token}") + logger.warning("post_keepers - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") new_keepers = [] @@ -110,7 +110,7 @@ async def post_keepers(k_list: KeeperList, token: str = Depends(oauth2_scheme)): @handle_db_errors async def delete_keeper(keeper_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_keeper - Bad Token: {token}") + logger.warning("delete_keeper - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_keeper = Keeper.get_or_none(Keeper.id == keeper_id) diff --git a/app/routers_v3/managers.py b/app/routers_v3/managers.py index 4c0de88..35a06de 100644 --- a/app/routers_v3/managers.py +++ b/app/routers_v3/managers.py @@ -103,7 +103,7 @@ async def patch_manager( token: str = Depends(oauth2_scheme), ): if not valid_token(token): - logger.warning(f"patch_manager - Bad Token: {token}") + logger.warning("patch_manager - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_manager = Manager.get_or_none(Manager.id == manager_id) @@ -137,7 +137,7 @@ async def patch_manager( @handle_db_errors async def post_manager(new_manager: ManagerModel, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"post_manager - Bad Token: {token}") + logger.warning("post_manager - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_manager = Manager(**new_manager.dict()) @@ -157,7 +157,7 @@ async def post_manager(new_manager: ManagerModel, token: str = Depends(oauth2_sc @handle_db_errors async def delete_manager(manager_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_manager - Bad Token: {token}") + logger.warning("delete_manager - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_manager = Manager.get_or_none(Manager.id == manager_id) diff --git a/app/routers_v3/pitchingstats.py b/app/routers_v3/pitchingstats.py index d318013..126b7ec 100644 --- a/app/routers_v3/pitchingstats.py +++ b/app/routers_v3/pitchingstats.py @@ -311,7 +311,7 @@ async def patch_pitstats( stat_id: int, new_stats: PitStatModel, token: str = Depends(oauth2_scheme) ): if not valid_token(token): - logger.warning(f"patch_pitstats - Bad Token: {token}") + logger.warning("patch_pitstats - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") if PitchingStat.get_or_none(PitchingStat.id == stat_id) is None: @@ -327,7 +327,7 @@ async def patch_pitstats( @handle_db_errors async def post_pitstats(s_list: PitStatList, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"post_pitstats - Bad Token: {token}") + logger.warning("post_pitstats - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") all_stats = [] diff --git a/app/routers_v3/results.py b/app/routers_v3/results.py index 7ba46b8..d42260a 100644 --- a/app/routers_v3/results.py +++ b/app/routers_v3/results.py @@ -109,7 +109,7 @@ async def patch_result( token: str = Depends(oauth2_scheme), ): if not valid_token(token): - logger.warning(f"patch_player - Bad Token: {token}") + logger.warning("patch_player - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_result = Result.get_or_none(Result.id == result_id) @@ -155,7 +155,7 @@ async def patch_result( @handle_db_errors async def post_results(result_list: ResultList, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"patch_player - Bad Token: {token}") + logger.warning("patch_player - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") new_results = [] @@ -194,7 +194,7 @@ async def post_results(result_list: ResultList, token: str = Depends(oauth2_sche @handle_db_errors async def delete_result(result_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_result - Bad Token: {token}") + logger.warning("delete_result - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_result = Result.get_or_none(Result.id == result_id) diff --git a/app/routers_v3/sbaplayers.py b/app/routers_v3/sbaplayers.py index 296e21e..b568843 100644 --- a/app/routers_v3/sbaplayers.py +++ b/app/routers_v3/sbaplayers.py @@ -137,7 +137,7 @@ async def patch_player( token: str = Depends(oauth2_scheme), ): if not valid_token(token): - logging.warning(f"Bad Token: {token}") + logging.warning("Bad Token") db.close() raise HTTPException( status_code=401, @@ -180,7 +180,7 @@ async def patch_player( @handle_db_errors async def post_players(players: PlayerList, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logging.warning(f"Bad Token: {token}") + logging.warning("Bad Token") db.close() raise HTTPException( status_code=401, @@ -220,7 +220,7 @@ async def post_players(players: PlayerList, token: str = Depends(oauth2_scheme)) @handle_db_errors async def post_one_player(player: SbaPlayerModel, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logging.warning(f"Bad Token: {token}") + logging.warning("Bad Token") db.close() raise HTTPException( status_code=401, @@ -260,7 +260,7 @@ async def post_one_player(player: SbaPlayerModel, token: str = Depends(oauth2_sc @handle_db_errors async def delete_player(player_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logging.warning(f"Bad Token: {token}") + logging.warning("Bad Token") db.close() raise HTTPException( status_code=401, diff --git a/app/routers_v3/schedules.py b/app/routers_v3/schedules.py index afcaabf..0517e1f 100644 --- a/app/routers_v3/schedules.py +++ b/app/routers_v3/schedules.py @@ -101,7 +101,7 @@ async def patch_schedule( token: str = Depends(oauth2_scheme), ): if not valid_token(token): - logger.warning(f"patch_schedule - Bad Token: {token}") + logger.warning("patch_schedule - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_sched = Schedule.get_or_none(Schedule.id == schedule_id) @@ -140,7 +140,7 @@ async def patch_schedule( @handle_db_errors async def post_schedules(sched_list: ScheduleList, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"post_schedules - Bad Token: {token}") + logger.warning("post_schedules - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") new_sched = [] @@ -179,7 +179,7 @@ async def post_schedules(sched_list: ScheduleList, token: str = Depends(oauth2_s @handle_db_errors async def delete_schedule(schedule_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_schedule - Bad Token: {token}") + logger.warning("delete_schedule - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_sched = Schedule.get_or_none(Schedule.id == schedule_id) diff --git a/app/routers_v3/standings.py b/app/routers_v3/standings.py index f5ef37e..59f9893 100644 --- a/app/routers_v3/standings.py +++ b/app/routers_v3/standings.py @@ -87,7 +87,7 @@ async def patch_standings( token: str = Depends(oauth2_scheme), ): if not valid_token(token): - logger.warning(f"patch_standings - Bad Token: {token}") + logger.warning("patch_standings - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") try: @@ -111,7 +111,7 @@ async def patch_standings( @handle_db_errors async def post_standings(season: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"post_standings - Bad Token: {token}") + logger.warning("post_standings - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") new_teams = [] @@ -131,7 +131,7 @@ async def post_standings(season: int, token: str = Depends(oauth2_scheme)): @handle_db_errors async def recalculate_standings(season: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"recalculate_standings - Bad Token: {token}") + logger.warning("recalculate_standings - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") code = Standings.recalculate(season) diff --git a/app/routers_v3/stratgame.py b/app/routers_v3/stratgame.py index ba750a8..1bc994c 100644 --- a/app/routers_v3/stratgame.py +++ b/app/routers_v3/stratgame.py @@ -153,7 +153,7 @@ async def patch_game( scorecard_url: Optional[str] = None, ) -> Any: if not valid_token(token): - logger.warning(f"patch_game - Bad Token: {token}") + logger.warning("patch_game - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_game = StratGame.get_or_none(StratGame.id == game_id) @@ -234,7 +234,7 @@ async def patch_game( @handle_db_errors async def post_games(game_list: GameList, token: str = Depends(oauth2_scheme)) -> Any: if not valid_token(token): - logger.warning(f"post_games - Bad Token: {token}") + logger.warning("post_games - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") new_games = [] @@ -262,7 +262,7 @@ async def post_games(game_list: GameList, token: str = Depends(oauth2_scheme)) - @handle_db_errors async def wipe_game(game_id: int, token: str = Depends(oauth2_scheme)) -> Any: if not valid_token(token): - logger.warning(f"wipe_game - Bad Token: {token}") + logger.warning("wipe_game - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_game = StratGame.get_or_none(StratGame.id == game_id) @@ -289,7 +289,7 @@ async def wipe_game(game_id: int, token: str = Depends(oauth2_scheme)) -> Any: @handle_db_errors async def delete_game(game_id: int, token: str = Depends(oauth2_scheme)) -> Any: if not valid_token(token): - logger.warning(f"delete_game - Bad Token: {token}") + logger.warning("delete_game - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_game = StratGame.get_or_none(StratGame.id == game_id) diff --git a/app/routers_v3/stratplay/crud.py b/app/routers_v3/stratplay/crud.py index ee56f51..adb57ba 100644 --- a/app/routers_v3/stratplay/crud.py +++ b/app/routers_v3/stratplay/crud.py @@ -33,7 +33,7 @@ async def patch_play( play_id: int, new_play: PlayModel, token: str = Depends(oauth2_scheme) ): if not valid_token(token): - logger.warning(f"patch_play - Bad Token: {token}") + logger.warning("patch_play - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") if StratPlay.get_or_none(StratPlay.id == play_id) is None: @@ -50,7 +50,7 @@ async def patch_play( @handle_db_errors async def post_plays(p_list: PlayList, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"post_plays - Bad Token: {token}") + logger.warning("post_plays - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") new_plays = [] @@ -102,7 +102,7 @@ async def post_plays(p_list: PlayList, token: str = Depends(oauth2_scheme)): @handle_db_errors async def delete_play(play_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_play - Bad Token: {token}") + logger.warning("delete_play - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_play = StratPlay.get_or_none(StratPlay.id == play_id) @@ -125,7 +125,7 @@ async def delete_play(play_id: int, token: str = Depends(oauth2_scheme)): @handle_db_errors async def delete_plays_game(game_id: int, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_plays_game - Bad Token: {token}") + logger.warning("delete_plays_game - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") this_game = StratGame.get_or_none(StratGame.id == game_id) @@ -148,7 +148,7 @@ async def delete_plays_game(game_id: int, token: str = Depends(oauth2_scheme)): @handle_db_errors async def post_erun_check(token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"post_erun_check - Bad Token: {token}") + logger.warning("post_erun_check - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") all_plays = StratPlay.update(run=1).where( diff --git a/app/routers_v3/transactions.py b/app/routers_v3/transactions.py index 1880dcc..25f0149 100644 --- a/app/routers_v3/transactions.py +++ b/app/routers_v3/transactions.py @@ -111,7 +111,7 @@ async def patch_transactions( cancelled: Optional[bool] = None, ): if not valid_token(token): - logger.warning(f"patch_transactions - Bad Token: {token}") + logger.warning("patch_transactions - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") these_moves = Transaction.select().where(Transaction.moveid == move_id) @@ -138,7 +138,7 @@ async def post_transactions( moves: TransactionList, token: str = Depends(oauth2_scheme) ): if not valid_token(token): - logger.warning(f"post_transactions - Bad Token: {token}") + logger.warning("post_transactions - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") all_moves = [] @@ -186,7 +186,7 @@ async def post_transactions( @handle_db_errors async def delete_transactions(move_id, token: str = Depends(oauth2_scheme)): if not valid_token(token): - logger.warning(f"delete_transactions - Bad Token: {token}") + logger.warning("delete_transactions - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") delete_query = Transaction.delete().where(Transaction.moveid == move_id) diff --git a/app/routers_v3/views.py b/app/routers_v3/views.py index c658262..df02b42 100644 --- a/app/routers_v3/views.py +++ b/app/routers_v3/views.py @@ -122,7 +122,7 @@ async def refresh_season_batting_stats( Useful for full season updates. """ if not valid_token(token): - logger.warning(f"refresh_season_batting_stats - Bad Token: {token}") + logger.warning("refresh_season_batting_stats - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") logger.info(f"Refreshing all batting stats for season {season}") @@ -268,7 +268,7 @@ async def refresh_season_pitching_stats( Private endpoint - not included in public API documentation. """ if not valid_token(token): - logger.warning(f"refresh_season_batting_stats - Bad Token: {token}") + logger.warning("refresh_season_batting_stats - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") logger.info(f"Refreshing season {season} pitching stats") @@ -316,7 +316,7 @@ async def get_admin_cache_stats(token: str = Depends(oauth2_scheme)) -> dict: Private endpoint - requires authentication. """ if not valid_token(token): - logger.warning(f"get_admin_cache_stats - Bad Token: {token}") + logger.warning("get_admin_cache_stats - Bad Token") raise HTTPException(status_code=401, detail="Unauthorized") logger.info("Getting cache statistics")