Skip to content

Commit 23101f1

Browse files
Update to latest black
1 parent 8d77b49 commit 23101f1

18 files changed

Lines changed: 8 additions & 18 deletions

File tree

docs/changelog.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,8 @@
11
# Changelog
22

3+
## 2.4.1 - 2026-03-30
4+
- Cleanup
5+
36
## 2.4.0 - 2026-03-30
47
- `OidcMultiIssuerValidator` now models trust as explicit (issuer, audience) pairs,
58
allowing the same issuer to appear with different audiences.

docs/examples/service/flask--oidc-multi-issuer--local-and-remote-validation.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@
77
from flask import Flask, make_response, request
88
from functools import wraps
99

10-
1110
#############################################################################
1211
# Logging Configuration
1312
#############################################################################

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ examples = [
5858
# "planet-auth-config >= 2.0.0"
5959
]
6060
test = [
61-
"black < 26.0.0",
61+
"black",
6262
"coverage[toml]",
6363
"freezegun",
6464
"mypy",

src/planet_auth/oidc/api_clients/userinfo_api_client.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@
1515
from typing import Dict
1616
from planet_auth.oidc.api_clients.api_client import OidcApiClient
1717

18-
1918
# class UserinfoApiException(OidcApiClientException):
2019
# def __init__(self, **kwargs):
2120
# super().__init__(**kwargs)

src/planet_auth/oidc/auth_client.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,6 @@
3030
from planet_auth.oidc.oidc_credential import FileBackedOidcCredential
3131
import planet_auth.logging.auth_logger
3232

33-
3433
auth_logger = planet_auth.logging.auth_logger.getAuthLogger()
3534

3635

src/planet_auth/oidc/auth_clients/device_code_flow.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,6 @@
3939
OidcAuthClientWithRefreshingOidcTokenRequestAuthenticator,
4040
)
4141

42-
4342
auth_logger = planet_auth.logging.auth_logger.getAuthLogger()
4443

4544

src/planet_auth/oidc/oidc_credential.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ def _augment_rfc6749_data(self):
6363
try:
6464
access_token_str = self.access_token()
6565
if access_token_str:
66-
(_, jwt_hazmat_body, _) = TokenValidator.hazmat_unverified_decode(access_token_str)
66+
_, jwt_hazmat_body, _ = TokenValidator.hazmat_unverified_decode(access_token_str)
6767
else:
6868
jwt_hazmat_body = None
6969
except InvalidArgumentException:

src/planet_auth/storage_utils.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,6 @@
2525
from planet_auth.auth_exception import AuthException
2626
from planet_auth.util import auth_logger
2727

28-
2928
ObjectStorageProvider_KeyType = pathlib.Path
3029
"""
3130
Key type for object storage. Paths are currently used in part because of

src/planet_auth_config_injection/builtins_provider.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@
1515
from abc import ABC, abstractmethod
1616
from typing import Dict, List, Optional
1717

18-
1918
# Unlike other environment variables, AUTH_BUILTIN_PROVIDER is not name-spaced.
2019
# It is intended for libraries and applications to inject configuration by
2120
# being set within the program. It's not expected to be set by end-users.

src/planet_auth_utils/commands/cli/jwt_cmd.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ def print_jwt_parts(raw, header, body, signature, human_readable):
107107
def hazmat_print_jwt(token_str, human_readable):
108108
print("UNTRUSTED JWT Decoding\n")
109109
if token_str:
110-
(hazmat_header, hazmat_body, hazmat_signature) = TokenValidator.hazmat_unverified_decode(token_str)
110+
hazmat_header, hazmat_body, hazmat_signature = TokenValidator.hazmat_unverified_decode(token_str)
111111
print_jwt_parts(
112112
raw=token_str,
113113
header=hazmat_header,
@@ -186,7 +186,7 @@ def cmd_jwt_validate_oauth(ctx, token, token_file, audience, issuer, human_reada
186186
trust with what audiences MUST be controlled by the service operator.
187187
"""
188188
token_to_validate = _get_token_or_fail(token_opt=token, token_file_opt=token_file)
189-
(hazmat_header, hazmat_body, hazmat_signature) = TokenValidator.hazmat_unverified_decode(token_to_validate)
189+
hazmat_header, hazmat_body, hazmat_signature = TokenValidator.hazmat_unverified_decode(token_to_validate)
190190

191191
if issuer:
192192
validation_iss = issuer

0 commit comments

Comments
 (0)