Litellm ruff linting enforcement (#5992)

* ci(config.yml): add a 'check_code_quality' step

Addresses https://github.com/BerriAI/litellm/issues/5991

* ci(config.yml): check why circle ci doesn't pick up this test

* ci(config.yml): fix to run 'check_code_quality' tests

* fix(__init__.py): fix unprotected import

* fix(__init__.py): don't remove unused imports

* build(ruff.toml): update ruff.toml to ignore unused imports

* fix: fix: ruff + pyright - fix linting + type-checking errors

* fix: fix linting errors

* fix(lago.py): fix module init error

* fix: fix linting errors

* ci(config.yml): cd into correct dir for checks

* fix(proxy_server.py): fix linting error

* fix(utils.py): fix bare except

causes ruff linting errors

* fix: ruff - fix remaining linting errors

* fix(clickhouse.py): use standard logging object

* fix(__init__.py): fix unprotected import

* fix: ruff - fix linting errors

* fix: fix linting errors

* ci(config.yml): cleanup code qa step (formatting handled in local_testing)

* fix(_health_endpoints.py): fix ruff linting errors

* ci(config.yml): just use ruff in check_code_quality pipeline for now

* build(custom_guardrail.py): include missing file

* style(embedding_handler.py): fix ruff check
This commit is contained in:
Krish Dholakia 2024-10-01 16:44:20 -07:00 committed by GitHub
parent 3fc4ae0d65
commit d57be47b0f
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
263 changed files with 1687 additions and 3320 deletions

View file

@ -2,6 +2,7 @@ import sys
from typing import Any, Dict, List, Optional, get_args
import litellm
from litellm import get_secret, get_secret_str
from litellm._logging import verbose_proxy_logger
from litellm.proxy._types import CommonProxyErrors, LiteLLMPromptInjectionParams
from litellm.proxy.utils import get_instance_fn
@ -59,9 +60,15 @@ def initialize_callbacks_on_proxy(
presidio_logging_only
) # validate boolean given
params = {
_presidio_params = {}
if "presidio" in callback_specific_params and isinstance(
callback_specific_params["presidio"], dict
):
_presidio_params = callback_specific_params["presidio"]
params: Dict[str, Any] = {
"logging_only": presidio_logging_only,
**callback_specific_params.get("presidio", {}),
**_presidio_params,
}
pii_masking_object = _OPTIONAL_PresidioPIIMasking(**params)
imported_list.append(pii_masking_object)
@ -70,7 +77,7 @@ def initialize_callbacks_on_proxy(
_ENTERPRISE_LlamaGuard,
)
if premium_user != True:
if premium_user is not True:
raise Exception(
"Trying to use Llama Guard"
+ CommonProxyErrors.not_premium_user.value
@ -83,7 +90,7 @@ def initialize_callbacks_on_proxy(
_ENTERPRISE_SecretDetection,
)
if premium_user != True:
if premium_user is not True:
raise Exception(
"Trying to use secret hiding"
+ CommonProxyErrors.not_premium_user.value
@ -96,7 +103,7 @@ def initialize_callbacks_on_proxy(
_ENTERPRISE_OpenAI_Moderation,
)
if premium_user != True:
if premium_user is not True:
raise Exception(
"Trying to use OpenAI Moderations Check"
+ CommonProxyErrors.not_premium_user.value
@ -126,7 +133,7 @@ def initialize_callbacks_on_proxy(
_ENTERPRISE_GoogleTextModeration,
)
if premium_user != True:
if premium_user is not True:
raise Exception(
"Trying to use Google Text Moderation"
+ CommonProxyErrors.not_premium_user.value
@ -137,7 +144,7 @@ def initialize_callbacks_on_proxy(
elif isinstance(callback, str) and callback == "llmguard_moderations":
from enterprise.enterprise_hooks.llm_guard import _ENTERPRISE_LLMGuard
if premium_user != True:
if premium_user is not True:
raise Exception(
"Trying to use Llm Guard"
+ CommonProxyErrors.not_premium_user.value
@ -150,7 +157,7 @@ def initialize_callbacks_on_proxy(
_ENTERPRISE_BlockedUserList,
)
if premium_user != True:
if premium_user is not True:
raise Exception(
"Trying to use ENTERPRISE BlockedUser"
+ CommonProxyErrors.not_premium_user.value
@ -165,7 +172,7 @@ def initialize_callbacks_on_proxy(
_ENTERPRISE_BannedKeywords,
)
if premium_user != True:
if premium_user is not True:
raise Exception(
"Trying to use ENTERPRISE BannedKeyword"
+ CommonProxyErrors.not_premium_user.value
@ -212,7 +219,7 @@ def initialize_callbacks_on_proxy(
and isinstance(v, str)
and v.startswith("os.environ/")
):
azure_content_safety_params[k] = litellm.get_secret(v)
azure_content_safety_params[k] = get_secret(v)
azure_content_safety_obj = _PROXY_AzureContentSafety(
**azure_content_safety_params,