about summary refs log tree commit diff
diff options
context:
space:
mode:
authorFrederick Muriuki Muriithi2024-05-13 06:33:51 +0300
committerFrederick Muriuki Muriithi2024-05-13 06:33:51 +0300
commit2a25cce03405d23a19f984586aab3dd341912fd5 (patch)
tree7efc066acaa8ca61bf6379a2a3c4b2afec24bd3c
parenta22dbcba7b28b75c13aa25bdd36583ade5fe3747 (diff)
downloadgn-auth-2a25cce03405d23a19f984586aab3dd341912fd5.tar.gz
Fix myriad of linting error
These linting errors can't be rebased into the newer commits.
-rw-r--r--gn_auth/auth/authentication/oauth2/grants/jwt_bearer_grant.py6
-rw-r--r--gn_auth/auth/authentication/oauth2/models/oauth2client.py4
-rw-r--r--gn_auth/auth/authentication/oauth2/server.py4
-rw-r--r--gn_auth/auth/authorisation/users/admin/views.py9
4 files changed, 12 insertions, 11 deletions
diff --git a/gn_auth/auth/authentication/oauth2/grants/jwt_bearer_grant.py b/gn_auth/auth/authentication/oauth2/grants/jwt_bearer_grant.py
index d663aaf..b0f2cc7 100644
--- a/gn_auth/auth/authentication/oauth2/grants/jwt_bearer_grant.py
+++ b/gn_auth/auth/authentication/oauth2/grants/jwt_bearer_grant.py
@@ -35,8 +35,10 @@ class JWTBearerTokenGenerator(_JWTBearerTokenGenerator):
         }
 
 
-    def __call__(self, grant_type, client, user=None, scope=None,
-                 expires_in=None, include_refresh_token=True):
+    def __call__(# pylint: disable=[too-many-arguments]
+            self, grant_type, client, user=None, scope=None, expires_in=None,
+            include_refresh_token=True
+    ):
         # there is absolutely no refresh token in JWT format
         """
         The default generator does not provide refresh tokens with JWT. It goes
diff --git a/gn_auth/auth/authentication/oauth2/models/oauth2client.py b/gn_auth/auth/authentication/oauth2/models/oauth2client.py
index f48cbce..d31faf6 100644
--- a/gn_auth/auth/authentication/oauth2/models/oauth2client.py
+++ b/gn_auth/auth/authentication/oauth2/models/oauth2client.py
@@ -60,8 +60,8 @@ class OAuth2Client(ClientMixin):
     @cached_property
     def jwks(self) -> KeySet:
         """Return this client's KeySet."""
-        def __parse_key__(keypath: Path) -> JsonWebKey:# pylint: disable=[unspecified-encoding]
-            with open(keypath) as _key:
+        def __parse_key__(keypath: Path) -> JsonWebKey:
+            with open(keypath) as _key:# pylint: disable=[unspecified-encoding]
                 return JsonWebKey.import_key(_key.read())
 
         return KeySet([
diff --git a/gn_auth/auth/authentication/oauth2/server.py b/gn_auth/auth/authentication/oauth2/server.py
index 75d6e1b..d845c60 100644
--- a/gn_auth/auth/authentication/oauth2/server.py
+++ b/gn_auth/auth/authentication/oauth2/server.py
@@ -11,7 +11,7 @@ from authlib.integrations.flask_oauth2 import AuthorizationServer
 
 from gn_auth.auth.db import sqlite3 as db
 
-from .models.oauth2client import client
+from .models.oauth2client import client as fetch_client
 from .models.oauth2token import OAuth2Token, save_token
 from .models.jwtrefreshtoken import (
     JWTRefreshToken,
@@ -36,7 +36,7 @@ def create_query_client_func() -> Callable:
         # use current_app rather than passing the db_uri to avoid issues
         # when config changes, e.g. while testing.
         with db.connection(current_app.config["AUTH_DB"]) as conn:
-            _client = client(conn, client_id).maybe(
+            _client = fetch_client(conn, client_id).maybe(
                 None, lambda clt: clt) # type: ignore[misc]
             if bool(_client):
                 return _client
diff --git a/gn_auth/auth/authorisation/users/admin/views.py b/gn_auth/auth/authorisation/users/admin/views.py
index f004027..73e808a 100644
--- a/gn_auth/auth/authorisation/users/admin/views.py
+++ b/gn_auth/auth/authorisation/users/admin/views.py
@@ -18,7 +18,6 @@ from flask import (
     url_for,
     redirect,
     Blueprint,
-    current_app,
     render_template,
     current_app as app)
 
@@ -91,7 +90,7 @@ def login():
         email = validate_email(form.get("email", "").strip(),
                                check_deliverability=False)
         password = form.get("password")
-        with db.connection(current_app.config["AUTH_DB"]) as conn:
+        with db.connection(app.config["AUTH_DB"]) as conn:
             user = user_by_email(conn, email["email"])
             if valid_login(conn, user, password):
                 session.update_session_info(
@@ -195,7 +194,7 @@ def register_client():
     if request.method == "GET":
         return render_template(
             "admin/register-client.html",
-            scope=current_app.config["OAUTH2_SCOPE"],
+            scope=app.config["OAUTH2_SCOPE"],
             users=with_db_connection(__list_users__),
             granttypes=_FORM_GRANT_TYPES_,
             current_user=session.session_user())
@@ -259,7 +258,7 @@ def view_client(client_id: uuid.UUID):
     return render_template(
         "admin/view-oauth2-client.html",
         client=with_db_connection(partial(oauth2_client, client_id=client_id)),
-        scope=current_app.config["OAUTH2_SCOPE"],
+        scope=app.config["OAUTH2_SCOPE"],
         granttypes=_FORM_GRANT_TYPES_)
 
 @admin.route("/register-client-public-key", methods=["POST"])
@@ -358,7 +357,7 @@ def delete_client_public_key():
             client_metadata={
                 **_client.client_metadata,
                 "public_keys": list(set(
-                    keysdir.joinpath(f"{_key.thumbprint()}.pem")
+                    _keysdir.joinpath(f"{_key.thumbprint()}.pem")
                     for _key in _keys))},
             user=_client.user)))
     flash("Key deleted.", "alert-success")