Fix linting
This commit is contained in:
@@ -772,7 +772,7 @@ rag = LightRAG(
|
|||||||
create INDEX CONCURRENTLY entity_idx_node_id ON dickens."Entity" (ag_catalog.agtype_access_operator(properties, '"node_id"'::agtype));
|
create INDEX CONCURRENTLY entity_idx_node_id ON dickens."Entity" (ag_catalog.agtype_access_operator(properties, '"node_id"'::agtype));
|
||||||
CREATE INDEX CONCURRENTLY entity_node_id_gin_idx ON dickens."Entity" using gin(properties);
|
CREATE INDEX CONCURRENTLY entity_node_id_gin_idx ON dickens."Entity" using gin(properties);
|
||||||
ALTER TABLE dickens."DIRECTED" CLUSTER ON directed_sid_idx;
|
ALTER TABLE dickens."DIRECTED" CLUSTER ON directed_sid_idx;
|
||||||
|
|
||||||
-- 如有必要可以删除
|
-- 如有必要可以删除
|
||||||
drop INDEX entity_p_idx;
|
drop INDEX entity_p_idx;
|
||||||
drop INDEX vertex_p_idx;
|
drop INDEX vertex_p_idx;
|
||||||
|
@@ -765,7 +765,7 @@ For production level scenarios you will most likely want to leverage an enterpri
|
|||||||
create INDEX CONCURRENTLY entity_idx_node_id ON dickens."Entity" (ag_catalog.agtype_access_operator(properties, '"node_id"'::agtype));
|
create INDEX CONCURRENTLY entity_idx_node_id ON dickens."Entity" (ag_catalog.agtype_access_operator(properties, '"node_id"'::agtype));
|
||||||
CREATE INDEX CONCURRENTLY entity_node_id_gin_idx ON dickens."Entity" using gin(properties);
|
CREATE INDEX CONCURRENTLY entity_node_id_gin_idx ON dickens."Entity" using gin(properties);
|
||||||
ALTER TABLE dickens."DIRECTED" CLUSTER ON directed_sid_idx;
|
ALTER TABLE dickens."DIRECTED" CLUSTER ON directed_sid_idx;
|
||||||
|
|
||||||
-- drop if necessary
|
-- drop if necessary
|
||||||
drop INDEX entity_p_idx;
|
drop INDEX entity_p_idx;
|
||||||
drop INDEX vertex_p_idx;
|
drop INDEX vertex_p_idx;
|
||||||
|
@@ -136,7 +136,7 @@ def get_combined_auth_dependency(api_key: Optional[str] = None):
|
|||||||
|
|
||||||
### Authentication failed ####
|
### Authentication failed ####
|
||||||
|
|
||||||
# if password authentication is configured but not provided, ensure 401 error if auth_configured
|
# if password authentication is configured but not provided, ensure 401 error if auth_configured
|
||||||
if auth_configured and not token:
|
if auth_configured and not token:
|
||||||
raise HTTPException(
|
raise HTTPException(
|
||||||
status_code=status.HTTP_401_UNAUTHORIZED,
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||||
@@ -149,7 +149,7 @@ def get_combined_auth_dependency(api_key: Optional[str] = None):
|
|||||||
status_code=HTTP_403_FORBIDDEN,
|
status_code=HTTP_403_FORBIDDEN,
|
||||||
detail="Invalid API Key",
|
detail="Invalid API Key",
|
||||||
)
|
)
|
||||||
|
|
||||||
# if api_key_configured but not provided
|
# if api_key_configured but not provided
|
||||||
if api_key_configured and not api_key_header_value:
|
if api_key_configured and not api_key_header_value:
|
||||||
raise HTTPException(
|
raise HTTPException(
|
||||||
|
Reference in New Issue
Block a user