@@ -77,8 +77,6 @@ def _set_api_endpoints(self):
7777 try :
7878 self ._fetch_openid_configuration ()
7979 except Exception as e :
80- # If fetching OpenID Configuration fails, fall back to default endpoints
81- # self.logger.warning(f"Failed to fetch OpenID Configuration: {str(e)}. Using default endpoints.")
8280 self .auth_url = f"{ self .host } /oauth2/auth"
8381 self .token_url = f"{ self .host } /oauth2/token"
8482 self .logout_url = f"{ self .host } /logout"
@@ -105,10 +103,7 @@ def _fetch_openid_configuration(self):
105103 self .logout_url = config .get ("end_session_endpoint" , f"{ self .host } /logout" )
106104 self .userinfo_url = config .get ("userinfo_endpoint" , f"{ self .host } /oauth2/userinfo" )
107105
108- # self.logger.info("OpenID Configuration fetched and endpoints updated successfully")
109106 else :
110- # self.logger.warning(f"Failed to fetch OpenID Configuration: {response.status_code}")
111- # Set default endpoints if OpenID Configuration fetch fails
112107 self .auth_url = f"{ self .host } /oauth2/auth"
113108 self .token_url = f"{ self .host } /oauth2/token"
114109 self .logout_url = f"{ self .host } /logout"
@@ -361,79 +356,6 @@ async def logout(self, user_id: Optional[str] = None, logout_options: Dict[str,
361356 # Build logout URL
362357 query_string = urlencode (params )
363358 return f"{ self .logout_url } ?{ query_string } "
364-
365- # async def handle_redirect(self, code: str, user_id: str, state: Optional[str] = None) -> Dict[str, Any]:
366- # """
367- # Handle the OAuth redirect and exchange the code for tokens.
368-
369- # Args:
370- # code: Authorization code from the redirect
371- # user_id: User identifier for token storage
372- # state: State parameter for verification
373-
374- # Returns:
375- # Dict with user and token information
376- # """
377- # # Verify state if provided
378- # if state:
379- # stored_state = self.session_manager.storage_manager.get("state")
380- # if not stored_state or state != stored_state.get("value"):
381- # self.logger.error(f"State mismatch: received {state}, stored {stored_state}")
382- # raise KindeLoginException("Invalid state parameter")
383-
384- # # Get code verifier for PKCE
385- # code_verifier = None
386- # stored_code_verifier = self.session_manager.storage_manager.get("code_verifier")
387- # if stored_code_verifier:
388- # code_verifier = stored_code_verifier.get("value")
389-
390- # # Clean up the used code verifier
391- # self.session_manager.storage_manager.delete("code_verifier")
392-
393- # # Exchange code for tokens
394- # try:
395- # token_data = await self.exchange_code_for_tokens(code, code_verifier)
396- # except Exception as e:
397- # self.logger.error(f"Token exchange failed: {str(e)}")
398- # raise KindeTokenException(f"Failed to exchange code for tokens: {str(e)}")
399-
400- # # Store tokens
401- # user_info = {
402- # "client_id": self.client_id,
403- # "client_secret": self.client_secret,
404- # "token_url": self.token_url,
405- # "redirect_uri": self.redirect_uri,
406- # }
407-
408- # # Store session data
409- # self.session_manager.set_user_data(user_id, user_info, token_data)
410-
411- # # Get user details using the token
412- # try:
413- # token_manager = self.session_manager.get_token_manager(user_id)
414- # if token_manager:
415- # user_details = await helper_get_user_details(
416- # userinfo_url=self.userinfo_url,
417- # token_manager=token_manager,
418- # logger=self.logger
419- # )
420- # else:
421- # user_details = {}
422- # except Exception as e:
423- # self.logger.error(f"Failed to get user details: {str(e)}")
424- # user_details = {}
425-
426- # # Clean up state
427- # if state:
428- # self.session_manager.storage_manager.delete("state")
429-
430- # # Clean up nonce
431- # self.session_manager.storage_manager.delete("nonce")
432-
433- # return {
434- # "tokens": token_data,
435- # "user": user_details
436- # }
437359
438360 async def handle_redirect (self , code : str , user_id : str , state : Optional [str ] = None ) -> Dict [str , Any ]:
439361 """
@@ -559,17 +481,6 @@ def get_tokens(self, user_id: str) -> Dict[str, Any]:
559481 tokens = {}
560482
561483 try :
562- # # Check if token manager has any tokens
563- # if not token_manager.tokens or "access_token" not in token_manager.tokens:
564- # raise ValueError(f"No access token available for user {user_id}")
565-
566- # # Get access token
567- # access_token = token_manager.get_access_token()
568- # if not access_token:
569- # raise ValueError(f"Invalid access token for user {user_id}")
570-
571- # tokens["access_token"] = access_token
572-
573484 access_token = None
574485 if "access_token" in token_manager .tokens :
575486 access_token = token_manager .get_access_token ()
@@ -583,7 +494,6 @@ def get_tokens(self, user_id: str) -> Dict[str, Any]:
583494 # Get token expiration time
584495 if "expires_at" in token_manager .tokens :
585496 tokens ["expires_at" ] = token_manager .tokens ["expires_at" ]
586- # tokens["expires_in"] = max(0, int(token_manager.tokens["expires_at"] - time.time()))
587497 tokens ["expires_in" ] = max (0 , int (token_manager .tokens ["expires_at" ] - time .time ()))
588498
589499 # Add refresh token if available
0 commit comments