Skip to content

Commit 0c6501a

Browse files
Syed Raza AbbasSyed Raza Abbas
authored andcommitted
removed comments and unnecessary code
1 parent 53832e2 commit 0c6501a

File tree

3 files changed

+0
-124
lines changed

3 files changed

+0
-124
lines changed

kinde_sdk/auth/oauth.py

Lines changed: 0 additions & 90 deletions
Original file line numberDiff line numberDiff line change
@@ -77,8 +77,6 @@ def _set_api_endpoints(self):
7777
try:
7878
self._fetch_openid_configuration()
7979
except Exception as e:
80-
# If fetching OpenID Configuration fails, fall back to default endpoints
81-
# self.logger.warning(f"Failed to fetch OpenID Configuration: {str(e)}. Using default endpoints.")
8280
self.auth_url = f"{self.host}/oauth2/auth"
8381
self.token_url = f"{self.host}/oauth2/token"
8482
self.logout_url = f"{self.host}/logout"
@@ -105,10 +103,7 @@ def _fetch_openid_configuration(self):
105103
self.logout_url = config.get("end_session_endpoint", f"{self.host}/logout")
106104
self.userinfo_url = config.get("userinfo_endpoint", f"{self.host}/oauth2/userinfo")
107105

108-
# self.logger.info("OpenID Configuration fetched and endpoints updated successfully")
109106
else:
110-
# self.logger.warning(f"Failed to fetch OpenID Configuration: {response.status_code}")
111-
# Set default endpoints if OpenID Configuration fetch fails
112107
self.auth_url = f"{self.host}/oauth2/auth"
113108
self.token_url = f"{self.host}/oauth2/token"
114109
self.logout_url = f"{self.host}/logout"
@@ -361,79 +356,6 @@ async def logout(self, user_id: Optional[str] = None, logout_options: Dict[str,
361356
# Build logout URL
362357
query_string = urlencode(params)
363358
return f"{self.logout_url}?{query_string}"
364-
365-
# async def handle_redirect(self, code: str, user_id: str, state: Optional[str] = None) -> Dict[str, Any]:
366-
# """
367-
# Handle the OAuth redirect and exchange the code for tokens.
368-
369-
# Args:
370-
# code: Authorization code from the redirect
371-
# user_id: User identifier for token storage
372-
# state: State parameter for verification
373-
374-
# Returns:
375-
# Dict with user and token information
376-
# """
377-
# # Verify state if provided
378-
# if state:
379-
# stored_state = self.session_manager.storage_manager.get("state")
380-
# if not stored_state or state != stored_state.get("value"):
381-
# self.logger.error(f"State mismatch: received {state}, stored {stored_state}")
382-
# raise KindeLoginException("Invalid state parameter")
383-
384-
# # Get code verifier for PKCE
385-
# code_verifier = None
386-
# stored_code_verifier = self.session_manager.storage_manager.get("code_verifier")
387-
# if stored_code_verifier:
388-
# code_verifier = stored_code_verifier.get("value")
389-
390-
# # Clean up the used code verifier
391-
# self.session_manager.storage_manager.delete("code_verifier")
392-
393-
# # Exchange code for tokens
394-
# try:
395-
# token_data = await self.exchange_code_for_tokens(code, code_verifier)
396-
# except Exception as e:
397-
# self.logger.error(f"Token exchange failed: {str(e)}")
398-
# raise KindeTokenException(f"Failed to exchange code for tokens: {str(e)}")
399-
400-
# # Store tokens
401-
# user_info = {
402-
# "client_id": self.client_id,
403-
# "client_secret": self.client_secret,
404-
# "token_url": self.token_url,
405-
# "redirect_uri": self.redirect_uri,
406-
# }
407-
408-
# # Store session data
409-
# self.session_manager.set_user_data(user_id, user_info, token_data)
410-
411-
# # Get user details using the token
412-
# try:
413-
# token_manager = self.session_manager.get_token_manager(user_id)
414-
# if token_manager:
415-
# user_details = await helper_get_user_details(
416-
# userinfo_url=self.userinfo_url,
417-
# token_manager=token_manager,
418-
# logger=self.logger
419-
# )
420-
# else:
421-
# user_details = {}
422-
# except Exception as e:
423-
# self.logger.error(f"Failed to get user details: {str(e)}")
424-
# user_details = {}
425-
426-
# # Clean up state
427-
# if state:
428-
# self.session_manager.storage_manager.delete("state")
429-
430-
# # Clean up nonce
431-
# self.session_manager.storage_manager.delete("nonce")
432-
433-
# return {
434-
# "tokens": token_data,
435-
# "user": user_details
436-
# }
437359

438360
async def handle_redirect(self, code: str, user_id: str, state: Optional[str] = None) -> Dict[str, Any]:
439361
"""
@@ -559,17 +481,6 @@ def get_tokens(self, user_id: str) -> Dict[str, Any]:
559481
tokens = {}
560482

561483
try:
562-
# # Check if token manager has any tokens
563-
# if not token_manager.tokens or "access_token" not in token_manager.tokens:
564-
# raise ValueError(f"No access token available for user {user_id}")
565-
566-
# # Get access token
567-
# access_token = token_manager.get_access_token()
568-
# if not access_token:
569-
# raise ValueError(f"Invalid access token for user {user_id}")
570-
571-
# tokens["access_token"] = access_token
572-
573484
access_token = None
574485
if "access_token" in token_manager.tokens:
575486
access_token = token_manager.get_access_token()
@@ -583,7 +494,6 @@ def get_tokens(self, user_id: str) -> Dict[str, Any]:
583494
# Get token expiration time
584495
if "expires_at" in token_manager.tokens:
585496
tokens["expires_at"] = token_manager.tokens["expires_at"]
586-
# tokens["expires_in"] = max(0, int(token_manager.tokens["expires_at"] - time.time()))
587497
tokens["expires_in"] = max(0, int(token_manager.tokens["expires_at"] - time.time()))
588498

589499
# Add refresh token if available

kinde_sdk/auth/postgres_storage.py

Lines changed: 0 additions & 32 deletions
This file was deleted.

kinde_sdk/auth/user_session.py

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -167,8 +167,6 @@ def logout(self, user_id: str) -> None:
167167
del self.user_sessions[user_id]
168168

169169
# Delete from storage
170-
# self.storage.delete(user_id)
171-
# self.storage_manager.delete(user_id)
172170
self.storage_manager.clear_device_data()
173171

174172
def cleanup_expired_sessions(self) -> None:

0 commit comments

Comments
 (0)