-
Notifications
You must be signed in to change notification settings - Fork 73
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ruff format #388
Ruff format #388
Conversation
"The CSV file " | ||
+ csv_file | ||
+ " was not found in path: " | ||
+ str(emhass_conf["data_path"]) |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information High
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (private)
This expression logs
sensitive data (private)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
"No saved entity json files that match prefix: " | ||
+ str(publish_prefix) |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information High
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (private)
This expression logs
sensitive data (private)
@@ -1010,7 +1250,7 @@ | |||
type_var="cost_fun", | |||
publish_prefix=publish_prefix, | |||
save_entities=entity_save, | |||
dont_post=dont_post | |||
dont_post=dont_post, |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information High
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
with emhass_conf["associations_path"].open("r") as data: | ||
associations = list(csv.reader(data, delimiter=",")) |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information High
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (private)
This expression logs
sensitive data (private)
"Cant find associations file (associations.csv) in: " | ||
+ str(emhass_conf["associations_path"]) |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information High
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (private)
This expression logs
sensitive data (private)
This expression logs
sensitive data (secret)
app.logger.warning("Unable to find data_path: " + str(emhass_conf['data_path'])) | ||
# Check if data path exists | ||
if not os.path.isdir(emhass_conf["data_path"]): | ||
app.logger.warning("Unable to find data_path: " + str(emhass_conf["data_path"])) |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information High
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (private)
This expression logs
sensitive data (private)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
app.logger.info("data_path has been set to " + str(emhass_conf['data_path'])) | ||
Path(root_path / "data/").mkdir(parents=True, exist_ok=True) | ||
emhass_conf["data_path"] = root_path / "data/" | ||
app.logger.info("data_path has been set to " + str(emhass_conf["data_path"])) |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information High
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (private)
This expression logs
sensitive data (private)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
app.logger.info("The logging is: "+str(logging_level)) | ||
port = int(os.environ.get("PORT", 5000)) | ||
app.logger.info( | ||
"Launching the emhass webserver at: http://" + server_ip + ":" + str(port) |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information High
sensitive data (secret)
This expression logs
sensitive data (secret)
"Home Assistant data fetch will be performed using url: " | ||
+ params_secrets["hass_url"] |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information High
sensitive data (secret)
This expression logs
sensitive data (secret)
"Home Assistant data fetch will be performed using url: " | ||
+ params_secrets["hass_url"] | ||
) | ||
app.logger.info("The data path is: " + str(emhass_conf["data_path"])) |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information High
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (private)
This expression logs
sensitive data (private)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
This expression logs
sensitive data (secret)
@davidusb-geek this is what the project looks like with ruff auto formatting. |
@GeoDerp, I tried to merge the latest changes from master. Almost succeded but there is still a little error on some implementations of |
This PR is a predecessor of: #387
(feel free to pull this one and close 387)