@@ -145,7 +145,7 @@ def from_credential(
145145 cls ,
146146 google_cred : Union [google .oauth2 .service_account .Credentials , credentials .Signing ]
147147 ) -> '_SigningProvider' :
148- return _SigningProvider (google_cred .signer , google_cred .signer_email ) # type: ignore[reportUnknownMemberType]
148+ return _SigningProvider (google_cred .signer , google_cred .signer_email )
149149
150150 @classmethod
151151 def from_iam (
@@ -203,10 +203,10 @@ def _init_signing_provider(self) -> _SigningProvider:
203203 # Attempt to discover a service account email from the local Metadata service. Use it
204204 # with the IAM service to sign bytes.
205205 resp = self .request (url = METADATA_SERVICE_URL , headers = {'Metadata-Flavor' : 'Google' })
206- if resp .status != 200 : # type: ignore[reportUnknownMemberType]
206+ if resp .status != 200 :
207207 raise ValueError (
208- 'Failed to contact the local metadata service: {0}.' .format (resp .data .decode ())) # type: ignore[reportUnknownMemberType]
209- service_account = cast (str , resp .data .decode ()) # type: ignore[reportUnknownMemberType]
208+ 'Failed to contact the local metadata service: {0}.' .format (resp .data .decode ()))
209+ service_account = cast (str , resp .data .decode ())
210210 return _SigningProvider .from_iam (self .request , google_cred , service_account )
211211
212212 @property
@@ -268,7 +268,7 @@ def create_custom_token(
268268
269269 header = {'alg' : signing_provider .alg }
270270 try :
271- return jwt .encode (signing_provider .signer , payload , header = header ) # type: ignore[reportUnknownMemberType]
271+ return jwt .encode (signing_provider .signer , payload , header = header )
272272 except google .auth .exceptions .TransportError as error :
273273 msg = 'Failed to sign custom token. {0}' .format (error )
274274 raise TokenSignError (msg , error )
@@ -343,7 +343,8 @@ def __call__(
343343 ) -> google .auth .transport .Response :
344344 timeout = timeout or self .timeout_seconds
345345 return self ._delegate (
346- url , method = method , body = body , headers = headers , timeout = timeout , ** kwargs ) # type: ignore[reportArgumentType]
346+ url , method = method , body = body , headers = headers ,
347+ timeout = timeout , ** kwargs ) # pyright: ignore[reportArgumentType]
347348
348349
349350class TokenVerifier :
@@ -497,14 +498,15 @@ def verify(
497498
498499 try :
499500 if emulated :
500- verified_claims : Dict [ str , Any ] = payload
501+ verified_claims = payload
501502 else :
502- verified_claims = google .oauth2 .id_token .verify_token ( # type: ignore[reportUnknownMemberType]
503+ verified_claims = google .oauth2 .id_token .verify_token (
503504 token ,
504505 request = request ,
505506 audience = self .project_id ,
506507 certs_url = self .cert_url ,
507508 clock_skew_in_seconds = clock_skew_seconds )
509+ verified_claims = cast (Dict [str , Any ], verified_claims )
508510 verified_claims ['uid' ] = verified_claims ['sub' ]
509511 return verified_claims
510512 except google .auth .exceptions .TransportError as error :
@@ -519,8 +521,8 @@ def _decode_unverified(
519521 token : Union [bytes , str ],
520522 ) -> Tuple [Dict [str , str ], Dict [str , Any ]]:
521523 try :
522- header = cast ('Mapping[str, str]' , jwt .decode_header (token )) # type: ignore[reportUnknownMemberType]
523- payload = cast ('Mapping[str, Any]' , jwt .decode (token , verify = False )) # type: ignore[reportUnknownMemberType]
524+ header = cast ('Mapping[str, str]' , jwt .decode_header (token ))
525+ payload = cast ('Mapping[str, Any]' , jwt .decode (token , verify = False ))
524526 return dict (header ), dict (payload )
525527 except ValueError as error :
526528 raise self ._invalid_token_error (str (error ), error )
0 commit comments