Skip to content

Commit e4d0aec

Browse files
committed
fix: pre-commit
1 parent df9a6a0 commit e4d0aec

File tree

2 files changed

+2
-3
lines changed

2 files changed

+2
-3
lines changed

docs/usage.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -440,6 +440,7 @@ pass ``enforce_minimum_key_length=True`` in the options when creating a
440440
... strict_jwt.encode({"some": "payload"}, "short", algorithm="HS256")
441441
... except jwt.InvalidKeyError:
442442
... print("key too short")
443+
...
443444
key too short
444445
445446
To suppress the warning without enforcing, use Python's standard

tests/test_jwks_client.py

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -342,9 +342,7 @@ def test_get_jwt_set_sslcontext_default(self):
342342
ssl_ctx = ssl.create_default_context()
343343
jwks_client = PyJWKClient(url, ssl_context=ssl_ctx)
344344

345-
with mocked_success_response(
346-
RESPONSE_DATA_WITH_MATCHING_KID
347-
) as mock_request:
345+
with mocked_success_response(RESPONSE_DATA_WITH_MATCHING_KID) as mock_request:
348346
jwk_set = jwks_client.get_jwk_set()
349347
request_call = mock_request.call_args
350348
assert request_call[1].get("context") is ssl_ctx

0 commit comments

Comments
 (0)