Skip to content

Commit f5df897

Browse files
committed
Blacken and isorted.
1 parent 163bfcb commit f5df897

11 files changed

+122
-85
lines changed

src/idpyoidc/server/oauth2/token.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ def configure_grant_types(self, grant_types_helpers):
7878
raise ProcessError(f"Failed to initialize class {grant_class}: {e}")
7979

8080
def _post_parse_request(
81-
self, request: Union[Message, dict], client_id: Optional[str] = "", **kwargs
81+
self, request: Union[Message, dict], client_id: Optional[str] = "", **kwargs
8282
):
8383
grant_type = request["grant_type"]
8484
_helper = self.helper.get(grant_type)

src/idpyoidc/server/oauth2/token_helper.py

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -121,8 +121,9 @@ def process_request(self, req: Union[Message, dict], **kwargs):
121121
except KeyError: # Missing code parameter - absolutely fatal
122122
return self.error_cls(error="invalid_request", error_description="Missing code")
123123

124-
_session_info = _mngr.get_session_info_by_token(_access_code, grant=True,
125-
handler_key="authorization_code")
124+
_session_info = _mngr.get_session_info_by_token(
125+
_access_code, grant=True, handler_key="authorization_code"
126+
)
126127
client_id = _session_info["client_id"]
127128
if client_id != req["client_id"]:
128129
logger.debug("{} owner of token".format(client_id))
@@ -210,8 +211,9 @@ def post_parse_request(
210211

211212
_mngr = self.endpoint.server_get("endpoint_context").session_manager
212213
try:
213-
_session_info = _mngr.get_session_info_by_token(request["code"], grant=True,
214-
handler_key="authorization_code")
214+
_session_info = _mngr.get_session_info_by_token(
215+
request["code"], grant=True, handler_key="authorization_code"
216+
)
215217
except (KeyError, UnknownToken):
216218
logger.error("Access Code invalid")
217219
return self.error_cls(error="invalid_grant", error_description="Unknown code")
@@ -244,8 +246,9 @@ def process_request(self, req: Union[Message, dict], **kwargs):
244246
return self.error_cls(error="invalid_request", error_description="Wrong grant_type")
245247

246248
token_value = req["refresh_token"]
247-
_session_info = _mngr.get_session_info_by_token(token_value, grant=True,
248-
handler_key="refresh_token")
249+
_session_info = _mngr.get_session_info_by_token(
250+
token_value, grant=True, handler_key="refresh_token"
251+
)
249252
logger.debug("Session info: {}".format(_session_info))
250253

251254
if _session_info["client_id"] != req["client_id"]:
@@ -339,8 +342,9 @@ def post_parse_request(
339342

340343
_mngr = _context.session_manager
341344
try:
342-
_session_info = _mngr.get_session_info_by_token(request["refresh_token"], grant=True,
343-
handler_key="refresh_token")
345+
_session_info = _mngr.get_session_info_by_token(
346+
request["refresh_token"], grant=True, handler_key="refresh_token"
347+
)
344348
except (KeyError, UnknownToken):
345349
logger.error("Refresh token invalid")
346350
return self.error_cls(error="invalid_grant", error_description="Invalid refresh token")
@@ -422,7 +426,8 @@ def post_parse_request(self, request, client_id="", **kwargs):
422426
# token exchange is about minting one token based on another
423427
_handler_key = self.token_types_mapping[request["subject_token_type"]]
424428
_session_info = _mngr.get_session_info_by_token(
425-
request["subject_token"], grant=True, handler_key=_handler_key)
429+
request["subject_token"], grant=True, handler_key=_handler_key
430+
)
426431
except (KeyError, UnknownToken, BadSyntax) as err:
427432
logger.error(f"Subject token invalid ({err}).")
428433
return self.error_cls(
@@ -522,7 +527,8 @@ def process_request(self, request, **kwargs):
522527
try:
523528
_handler_key = self.token_types_mapping[request["subject_token_type"]]
524529
_session_info = _mngr.get_session_info_by_token(
525-
request["subject_token"], grant=True, handler_key=_handler_key)
530+
request["subject_token"], grant=True, handler_key=_handler_key
531+
)
526532
except ToOld:
527533
logger.error("Subject token has expired.")
528534
return self.error_cls(

src/idpyoidc/server/oidc/token_helper.py

Lines changed: 20 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,9 @@ def _get_session_info(self, request, session_manager):
3030
except KeyError: # Missing code parameter - absolutely fatal
3131
return self.error_cls(error="invalid_request", error_description="Missing code")
3232

33-
_session_info = session_manager.get_session_info_by_token(_access_code, grant=True,
34-
handler_key='authorization_code')
33+
_session_info = session_manager.get_session_info_by_token(
34+
_access_code, grant=True, handler_key="authorization_code"
35+
)
3536
logger.debug(f"Session info: {_session_info}")
3637
return _session_info, _access_code
3738

@@ -119,9 +120,9 @@ def process_request(self, req: Union[Message, dict], **kwargs):
119120
_response["expires_in"] = token.expires_at - utc_time_sans_frac()
120121

121122
if (
122-
issue_refresh
123-
and "refresh_token" in _supports_minting
124-
and "refresh_token" in grant_types_supported
123+
issue_refresh
124+
and "refresh_token" in _supports_minting
125+
and "refresh_token" in grant_types_supported
125126
):
126127
try:
127128
refresh_token = self._mint_token(
@@ -164,7 +165,7 @@ def process_request(self, req: Union[Message, dict], **kwargs):
164165
return _response
165166

166167
def post_parse_request(
167-
self, request: Union[Message, dict], client_id: Optional[str] = "", **kwargs
168+
self, request: Union[Message, dict], client_id: Optional[str] = "", **kwargs
168169
) -> Union[Message, dict]:
169170
"""
170171
This is where clients come to get their access tokens
@@ -176,8 +177,9 @@ def post_parse_request(
176177

177178
_mngr = self.endpoint.server_get("endpoint_context").session_manager
178179
try:
179-
_session_info = _mngr.get_session_info_by_token(request["code"], grant=True,
180-
handler_key='authorization_code')
180+
_session_info = _mngr.get_session_info_by_token(
181+
request["code"], grant=True, handler_key="authorization_code"
182+
)
181183
except (KeyError, UnknownToken):
182184
logger.error("Access Code invalid")
183185
return self.error_cls(error="invalid_grant", error_description="Unknown code")
@@ -215,8 +217,9 @@ def process_request(self, req: Union[Message, dict], **kwargs):
215217

216218
token_value = req["refresh_token"]
217219

218-
_session_info = _mngr.get_session_info_by_token(token_value, handler_key="refresh_token",
219-
grant=True)
220+
_session_info = _mngr.get_session_info_by_token(
221+
token_value, handler_key="refresh_token", grant=True
222+
)
220223
if _session_info["client_id"] != req["client_id"]:
221224
logger.debug("{} owner of token".format(_session_info["client_id"]))
222225
logger.warning("{} using token it was not given".format(req["client_id"]))
@@ -298,9 +301,9 @@ def process_request(self, req: Union[Message, dict], **kwargs):
298301
token.register_usage()
299302

300303
if (
301-
"client_id" in req
302-
and req["client_id"] in _context.cdb
303-
and "revoke_refresh_on_issue" in _context.cdb[req["client_id"]]
304+
"client_id" in req
305+
and req["client_id"] in _context.cdb
306+
and "revoke_refresh_on_issue" in _context.cdb[req["client_id"]]
304307
):
305308
revoke_refresh = _context.cdb[req["client_id"]].get("revoke_refresh_on_issue")
306309
else:
@@ -312,7 +315,7 @@ def process_request(self, req: Union[Message, dict], **kwargs):
312315
return _resp
313316

314317
def post_parse_request(
315-
self, request: Union[Message, dict], client_id: Optional[str] = "", **kwargs
318+
self, request: Union[Message, dict], client_id: Optional[str] = "", **kwargs
316319
):
317320
"""
318321
This is where clients come to refresh their access tokens
@@ -333,9 +336,9 @@ def post_parse_request(
333336

334337
_mngr = _context.session_manager
335338
try:
336-
_session_info = _mngr.get_session_info_by_token(request["refresh_token"],
337-
handler_key="refresh_token",
338-
grant=True)
339+
_session_info = _mngr.get_session_info_by_token(
340+
request["refresh_token"], handler_key="refresh_token", grant=True
341+
)
339342
except (KeyError, UnknownToken, BadSyntax):
340343
logger.error("Refresh token invalid")
341344
return self.error_cls(error="invalid_grant", error_description="Invalid refresh token")

src/idpyoidc/server/oidc/userinfo.py

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -49,15 +49,16 @@ def __init__(self, server_get: Callable, add_claims_by_scope: Optional[bool] = T
4949

5050
def get_client_id_from_token(self, endpoint_context, token, request=None):
5151
_info = endpoint_context.session_manager.get_session_info_by_token(
52-
token, handler_key="access_token")
52+
token, handler_key="access_token"
53+
)
5354
return _info["client_id"]
5455

5556
def do_response(
56-
self,
57-
response_args: Optional[Union[Message, dict]] = None,
58-
request: Optional[Union[Message, dict]] = None,
59-
client_id: Optional[str] = "",
60-
**kwargs
57+
self,
58+
response_args: Optional[Union[Message, dict]] = None,
59+
request: Optional[Union[Message, dict]] = None,
60+
client_id: Optional[str] = "",
61+
**kwargs
6162
) -> dict:
6263

6364
if "error" in kwargs and kwargs["error"]:
@@ -114,8 +115,9 @@ def do_response(
114115
def process_request(self, request=None, **kwargs):
115116
_mngr = self.server_get("endpoint_context").session_manager
116117
try:
117-
_session_info = _mngr.get_session_info_by_token(request["access_token"],
118-
grant=True, handler_key="access_token")
118+
_session_info = _mngr.get_session_info_by_token(
119+
request["access_token"], grant=True, handler_key="access_token"
120+
)
119121
except (KeyError, ValueError):
120122
return self.error_cls(error="invalid_token", error_description="Invalid Token")
121123

src/idpyoidc/server/session/manager.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -565,7 +565,7 @@ def get_session_info_by_token(
565565
grant: Optional[bool] = False,
566566
authentication_event: Optional[bool] = False,
567567
authorization_request: Optional[bool] = False,
568-
handler_key: Optional[str] = '',
568+
handler_key: Optional[str] = "",
569569
) -> dict:
570570
if handler_key:
571571
_token_info = self.token_handler.handler[handler_key].info(token_value)

src/idpyoidc/server/token/jwt_token.py

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -6,25 +6,26 @@
66

77
from idpyoidc.encrypter import init_encrypter
88
from idpyoidc.server.exception import ToOld
9-
from . import is_expired
9+
10+
from ..constant import DEFAULT_TOKEN_LIFETIME
1011
from . import Token
12+
from . import is_expired
1113
from .exception import UnknownToken
1214
from .exception import WrongTokenClass
13-
from ..constant import DEFAULT_TOKEN_LIFETIME
1415

1516

1617
class JWTToken(Token):
1718
def __init__(
18-
self,
19-
token_class,
20-
# keyjar: KeyJar = None,
21-
issuer: str = None,
22-
aud: Optional[list] = None,
23-
alg: str = "ES256",
24-
lifetime: int = DEFAULT_TOKEN_LIFETIME,
25-
server_get: Callable = None,
26-
token_type: str = "Bearer",
27-
**kwargs
19+
self,
20+
token_class,
21+
# keyjar: KeyJar = None,
22+
issuer: str = None,
23+
aud: Optional[list] = None,
24+
alg: str = "ES256",
25+
lifetime: int = DEFAULT_TOKEN_LIFETIME,
26+
server_get: Callable = None,
27+
token_type: str = "Bearer",
28+
**kwargs
2829
):
2930
Token.__init__(self, token_class, **kwargs)
3031
self.token_type = token_type
@@ -45,11 +46,11 @@ def load_custom_claims(self, payload: dict = None):
4546
return payload
4647

4748
def __call__(
48-
self,
49-
session_id: Optional[str] = "",
50-
token_class: Optional[str] = "",
51-
usage_rules: Optional[dict] = None,
52-
**payload
49+
self,
50+
session_id: Optional[str] = "",
51+
token_class: Optional[str] = "",
52+
usage_rules: Optional[dict] = None,
53+
**payload
5354
) -> str:
5455
"""
5556
Return a token.

tests/test_server_10_session_manager.py

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -364,8 +364,9 @@ def test_get_session_info_by_token(self):
364364

365365
grant = self.session_manager.get_grant(_session_id)
366366
code = self._mint_token("authorization_code", grant, _session_id)
367-
_session_info = self.session_manager.get_session_info_by_token(code.value,
368-
handler_key="authorization_code")
367+
_session_info = self.session_manager.get_session_info_by_token(
368+
code.value, handler_key="authorization_code"
369+
)
369370

370371
assert set(_session_info.keys()) == {
371372
"client_id",

tests/test_server_24_oauth2_token_endpoint.py

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -354,7 +354,8 @@ def test_do_refresh_access_token(self):
354354

355355
_token_value = _resp["response_args"]["refresh_token"]
356356
_session_info = self.session_manager.get_session_info_by_token(
357-
_token_value, handler_key="refresh_token")
357+
_token_value, handler_key="refresh_token"
358+
)
358359
_token = self.session_manager.find_token(_session_info["session_id"], _token_value)
359360
_token.usage_rules["supports_minting"] = ["access_token", "refresh_token"]
360361

@@ -410,8 +411,9 @@ def test_do_2nd_refresh_access_token(self):
410411

411412
# Make sure ID Tokens can also be used by this refesh token
412413
_token_value = _resp["response_args"]["refresh_token"]
413-
_session_info = self.session_manager.get_session_info_by_token(_token_value,
414-
handler_key="refresh_token")
414+
_session_info = self.session_manager.get_session_info_by_token(
415+
_token_value, handler_key="refresh_token"
416+
)
415417
_token = self.session_manager.find_token(_session_info["session_id"], _token_value)
416418
_token.usage_rules["supports_minting"] = [
417419
"access_token",
@@ -580,8 +582,9 @@ def test_refresh_scopes(self):
580582
}
581583

582584
_token_value = _resp["response_args"]["access_token"]
583-
_session_info = self.session_manager.get_session_info_by_token(_token_value,
584-
handler_key="access_token")
585+
_session_info = self.session_manager.get_session_info_by_token(
586+
_token_value, handler_key="access_token"
587+
)
585588
at = self.session_manager.find_token(_session_info["session_id"], _token_value)
586589
rt = self.session_manager.find_token(
587590
_session_info["session_id"], _resp["response_args"]["refresh_token"]
@@ -655,8 +658,9 @@ def test_refresh_more_scopes_2(self):
655658
}
656659

657660
_token_value = _resp["response_args"]["access_token"]
658-
_session_info = self.session_manager.get_session_info_by_token(_token_value,
659-
handler_key="access_token")
661+
_session_info = self.session_manager.get_session_info_by_token(
662+
_token_value, handler_key="access_token"
663+
)
660664
at = self.session_manager.find_token(_session_info["session_id"], _token_value)
661665
rt = self.session_manager.find_token(
662666
_session_info["session_id"], _resp["response_args"]["refresh_token"]
@@ -756,8 +760,9 @@ def test_refresh_token_request_other_client(self):
756760
_request["refresh_token"] = _resp["response_args"]["refresh_token"]
757761

758762
_token_value = _resp["response_args"]["refresh_token"]
759-
_session_info = self.session_manager.get_session_info_by_token(_token_value,
760-
handler_key="refresh_token")
763+
_session_info = self.session_manager.get_session_info_by_token(
764+
_token_value, handler_key="refresh_token"
765+
)
761766
_token = self.session_manager.find_token(_session_info["session_id"], _token_value)
762767
_token.usage_rules["supports_minting"] = ["access_token", "refresh_token"]
763768

tests/test_server_30_oidc_end_session.py

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -295,7 +295,8 @@ def test_end_session_endpoint_with_cookie(self):
295295
_resp = self._code_auth("1234567")
296296
_code = _resp["response_args"]["code"]
297297
_session_info = self.session_manager.get_session_info_by_token(
298-
_code, handler_key="authorization_code")
298+
_code, handler_key="authorization_code"
299+
)
299300
cookie = self._create_cookie(_session_info["session_id"])
300301
http_info = {"cookie": [cookie]}
301302
resp = self.session_endpoint.process_request({"state": "foo"}, http_info=http_info)
@@ -344,7 +345,8 @@ def test_end_session_endpoint_with_cookie_dual_login(self):
344345
self._code_auth2("abcdefg")
345346
_code = _resp["response_args"]["code"]
346347
_session_info = self.session_manager.get_session_info_by_token(
347-
_code, handler_key="authorization_code")
348+
_code, handler_key="authorization_code"
349+
)
348350
cookie = self._create_cookie(_session_info["session_id"])
349351
http_info = {"cookie": [cookie]}
350352

@@ -365,7 +367,8 @@ def test_end_session_endpoint_with_post_logout_redirect_uri(self):
365367
self._code_auth2("abcdefg")
366368
_code = _resp["response_args"]["code"]
367369
_session_info = self.session_manager.get_session_info_by_token(
368-
_code, handler_key="authorization_code")
370+
_code, handler_key="authorization_code"
371+
)
369372
cookie = self._create_cookie(_session_info["session_id"])
370373
http_info = {"cookie": [cookie]}
371374

@@ -597,7 +600,8 @@ def test_do_verified_logout(self):
597600
_resp = self._code_auth("1234567")
598601
_code = _resp["response_args"]["code"]
599602
_session_info = self.session_manager.get_session_info_by_token(
600-
_code, handler_key="authorization_code")
603+
_code, handler_key="authorization_code"
604+
)
601605
_cdb = self.session_endpoint.server_get("endpoint_context").cdb
602606
_cdb["client_1"]["backchannel_logout_uri"] = "https://example.com/bc_logout"
603607
_cdb["client_1"]["client_id"] = "client_1"
@@ -609,7 +613,8 @@ def test_logout_from_client_unknow_sid(self):
609613
_resp = self._code_auth("1234567")
610614
_code = _resp["response_args"]["code"]
611615
_session_info = self.session_manager.get_session_info_by_token(
612-
_code, handler_key="authorization_code")
616+
_code, handler_key="authorization_code"
617+
)
613618
self._code_auth2("abcdefg")
614619

615620
_uid, _cid, _gid = self.session_manager.decrypt_session_id(_session_info["session_id"])
@@ -621,7 +626,8 @@ def test_logout_from_client_no_session(self):
621626
_resp = self._code_auth("1234567")
622627
_code = _resp["response_args"]["code"]
623628
_session_info = self.session_manager.get_session_info_by_token(
624-
_code, handler_key="authorization_code")
629+
_code, handler_key="authorization_code"
630+
)
625631
self._code_auth2("abcdefg")
626632

627633
# client0

0 commit comments

Comments
 (0)