Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(server): handle null key string in utils (check_null_key) #789

Merged
merged 1 commit into from
Jan 11, 2024

Conversation

tezer
Copy link
Contributor

@tezer tezer commented Jan 5, 2024

Ensure that the shorten_key function in utils.py returns the key string itself when it is null or empty, preventing further processing that could lead to errors.

Please describe the purpose of this pull request.
Is it to add a new feature? Is it to fix a bug?
to fix a bug

How to test
How can we test your PR during review? What commands should we run? What outcomes should we expect?
use server endpoint GET /config if one of the 'key' values is not set (e.g. 'azure_key')

Have you tested this PR?
Have you tested the latest commit on the PR? If so please provide outputs from your tests.
I tested the endpoint, the result was the system's config

Related issues or PRs
Please link any related GitHub issues or PRs.

Is your PR over 500 lines of code?
If so, please break up your PR into multiple smaller PRs so that we can review them quickly, or provide justification for its length.
no

Additional context
Add any other context or screenshots about the PR here.

Ensure that the `shorten_key` function in `utils.py` returns the key string itself when it is null or empty, preventing further processing that could lead to errors.
@cpacker cpacker merged commit e5e517e into letta-ai:main Jan 11, 2024
2 of 3 checks passed
@cpacker
Copy link
Collaborator

cpacker commented Jan 11, 2024

Thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants