@@ -36,30 +36,30 @@ func getScopeEndpoint(scope string) (common.Endpoint, bool) {
3636func (a Analyzer ) Analyze (_ context.Context , credInfo map [string ]string ) (* analyzers.AnalyzerResult , error ) {
3737 token , ok := credInfo ["token" ]
3838 if ! ok {
39- return nil , errors .New ("token not found in credInfo" )
39+ return nil , analyzers . NewAnalysisError ( "AirtablePat" , "validate_credentials" , "config" , "" , errors .New ("token not found in credInfo" ) )
4040 }
4141
4242 userInfo , err := common .FetchAirtableUserInfo (token )
4343 if err != nil {
44- return nil , err
44+ return nil , analyzers . NewAnalysisError ( "AirtablePat" , "analyze_permissions" , "API" , "" , err )
4545 }
4646
4747 scopeStatusMap [common.PermissionStrings [common.UserEmailRead ]] = userInfo .Email != nil
4848
4949 var basesInfo * common.AirtableBases
5050 granted , err := determineScope (token , common .SchemaBasesRead , nil )
5151 if err != nil {
52- return nil , err
52+ return nil , analyzers . NewAnalysisError ( "AirtablePat" , "analyze_permissions" , "API" , "" , err )
5353 }
5454 if granted {
5555 basesInfo , err = common .FetchAirtableBases (token )
5656 if err != nil {
57- return nil , err
57+ return nil , analyzers . NewAnalysisError ( "AirtablePat" , "analyze_permissions" , "API" , "" , err )
5858 }
5959 // If bases are fetched, determine the token scopes
6060 err := determineScopes (token , basesInfo )
6161 if err != nil {
62- return nil , err
62+ return nil , analyzers . NewAnalysisError ( "AirtablePat" , "analyze_permissions" , "API" , "" , err )
6363 }
6464 }
6565
0 commit comments