Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implemented redaction functions to obscure sensitive information in strings #1217

Merged
merged 15 commits into from
Jan 24, 2025

Conversation

abhishek9sharma
Copy link
Contributor

@abhishek9sharma abhishek9sharma commented Jan 19, 2025

… strings,

- including `redact`, `ismatchingkey`, `can_convert_to_dict`, and
- `recursive_key_operation`.
- Added unit tests for the new functionalities to ensure correctness and reliability.
- Implemented redaction functions to obscure sensitive information in…
@CalebCourier CalebCourier self-assigned this Jan 22, 2025
@CalebCourier
Copy link
Collaborator

Tests are passing locally. Codecov generally fails on PRs from forks because of auth, so disregard those failed checks.

abhishek9sharma and others added 3 commits January 23, 2025 20:19
- code clarity and type safety.
- Updated `can_convert_to_dict` and `recursive_key_operation` functions
- to specify input and output types.
- Add type hints to function signatures in `common.py` for improved
abhishek9sharma and others added 2 commits January 24, 2025 07:07
- Updated docstring for clarity and improved input handling.
@CalebCourier CalebCourier merged commit 6283992 into guardrails-ai:main Jan 24, 2025
8 of 12 checks passed
@CalebCourier
Copy link
Collaborator

@abhishek9sharma Thanks again for your contribution! This will be part of our release next week. I also filed an issue concerning the Call logs you mentioned here: #1221

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants