Skip to content

Commit c7a242d

Browse files
run lint with the new tool
1 parent f409375 commit c7a242d

5 files changed

Lines changed: 20 additions & 22 deletions

File tree

app/spicedb/integrations/_meta.ts

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
export default {
2-
"langchain-spicedb":
3-
"Use SpiceDB with LangChain & LangGraph for RAG & AI Agent Authorization",
2+
"langchain-spicedb": "Use SpiceDB with LangChain & LangGraph for RAG & AI Agent Authorization",
43
pinecone: "Access Control in RAG with Pinecone and SpiceDB",
54
testcontainers: "Testing RAG Pipelines with Testcontainers",
65
};

app/spicedb/integrations/langchain-spicedb/page.mdx

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,9 @@ The retriever fetches documents using your vector store's semantic search, then
5757
Only documents that `alice` has the `view` permission for are returned.
5858

5959
<Callout type="info">
60-
Each document's metadata must include a field (specified by `resource_id_key`)
61-
that contains the resource identifier used in SpiceDB. This is how the library
62-
knows which SpiceDB resource to check permissions against.
60+
Each document's metadata must include a field (specified by `resource_id_key`) that contains the
61+
resource identifier used in SpiceDB. This is how the library knows which SpiceDB resource to check
62+
permissions against.
6363
</Callout>
6464

6565
**When to use this approach:**
@@ -194,9 +194,9 @@ The authorization node reads documents from `state["retrieved_documents"]`, chec
194194
Authorization metrics are automatically included in `state["auth_results"]`.
195195

196196
<Callout type="info">
197-
LangGraph is ideal when you need explicit control over each pipeline step,
198-
want to maintain state across multiple conversation turns, or need complex
199-
branching logic based on authorization results.
197+
LangGraph is ideal when you need explicit control over each pipeline step, want to maintain state
198+
across multiple conversation turns, or need complex branching logic based on authorization
199+
results.
200200
</Callout>
201201

202202
**When to use this approach:**
@@ -363,9 +363,9 @@ The library checks permissions for `document:123` when evaluating this document.
363363
If `resource_id_key` doesn't match a field in the document's metadata, that document will be filtered out.
364364

365365
<Callout type="warning">
366-
Ensure all documents in your vector store include the resource ID field.
367-
Documents missing this field will be silently excluded from results, which can
368-
lead to incomplete answers without explicit errors.
366+
Ensure all documents in your vector store include the resource ID field. Documents missing this
367+
field will be silently excluded from results, which can lead to incomplete answers without
368+
explicit errors.
369369
</Callout>
370370

371371
## Authorization Metrics
@@ -462,9 +462,9 @@ This flexibility allows you to choose the best vector store for your use case wi
462462
### Error Handling
463463

464464
<Callout type="warning">
465-
Never fall back to unfiltered results when authorization fails. This creates a
466-
path for information leakage during system outages. Instead, return an error
467-
to the user or empty results with an explanation.
465+
Never fall back to unfiltered results when authorization fails. This creates a path for
466+
information leakage during system outages. Instead, return an error to the user or empty results
467+
with an explanation.
468468
</Callout>
469469

470470
```python

app/spicedb/integrations/pinecone/page.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,9 @@ In this model, articles have two relations: `viewer` (users who can read) and `e
5050
The `view` permission is granted to anyone in either relation, while `edit` requires the `editor` relation.
5151

5252
<Callout type="info">
53-
Relations define direct relationships between objects, while permissions
54-
compute who has access based on those relations. You cannot write
55-
relationships directly to permissions—only to relations.
53+
Relations define direct relationships between objects, while permissions compute who has access
54+
based on those relations. You cannot write relationships directly to permissions—only to
55+
relations.
5656
</Callout>
5757

5858
## Authorization Strategies: Pre-Filter vs Post-Filter

app/spicedb/integrations/testcontainers/page.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,9 @@ Each test gets a fresh, isolated SpiceDB container:
5151
This approach eliminates flaky tests caused by shared state, manual setup, or mock inconsistencies.
5252

5353
<Callout type="info">
54-
Testcontainers requires Docker to be running on your system. Install Docker
55-
Desktop or Docker Engine before running tests. The framework automatically
56-
handles all container lifecycle management.
54+
Testcontainers requires Docker to be running on your system. Install Docker Desktop or Docker
55+
Engine before running tests. The framework automatically handles all container lifecycle
56+
management.
5757
</Callout>
5858

5959
## Setting Up Tests with Testcontainers

app/spicedb/tutorials/_meta.ts

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
export default {
2-
"ai-agent-authorization":
3-
"Tutorial: Authorization for AI Agents using SpiceDB",
2+
"ai-agent-authorization": "Tutorial: Authorization for AI Agents using SpiceDB",
43
"secure-rag-pipelines": "Tutorial: Securing RAG Pipelines with SpiceDB",
54
};

0 commit comments

Comments
 (0)