Skip to content

[GitHub Bot] Generated python SDK#138

Closed
mpragosa-te wants to merge 1 commit intomainfrom
20260227-130609
Closed

[GitHub Bot] Generated python SDK#138
mpragosa-te wants to merge 1 commit intomainfrom
20260227-130609

Conversation

@mpragosa-te
Copy link
Copy Markdown
Contributor

No description provided.

Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: f07568a4c0

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +333 to +334
_auth_settings: List[str] = [
]
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Add BearerAuth to connectors API requests

This request serializer leaves _auth_settings empty, so ApiClient.update_params_for_auth returns without applying any Authorization header even when Configuration(access_token=...) is provided; in practice, calls to protected connectors endpoints (including this one) are sent unauthenticated and will fail with 401s. The same pattern appears across the new connectors API modules, so these methods should include 'BearerAuth' in their auth settings.

Useful? React with 👍 / 👎.

Comment on lines +128 to +131
# deserialize data into OtherTokenAuthentication
try:
instance.actual_instance = OtherTokenAuthentication.from_json(json_str)
match += 1
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Disambiguate token auth oneOf matching

The oneOf deserializer attempts BearerTokenAuthentication and OtherTokenAuthentication back-to-back and increments match for each success; because those schemas have the same shape (token plus a non-literal AuthenticationType), valid token-auth payloads can match both and then hit the match > 1 error path, causing GenericConnector.authentication parsing to fail for legitimate API responses. Add discriminator/literal constraints so only one token schema can validate.

Useful? React with 👍 / 👎.

@rodrirod-te
Copy link
Copy Markdown
Contributor

superseded by github.com//pull/143

@rodrirod-te rodrirod-te deleted the 20260227-130609 branch March 19, 2026 14:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants