1818from idpyoidc .server .oauth2 .authorization import check_unknown_scopes_policy
1919from idpyoidc .server .session .grant import Grant
2020from idpyoidc .server .session .token import AuthorizationCode
21- from idpyoidc .server .session .token import RefreshToken
2221from idpyoidc .server .session .token import MintingNotAllowed
22+ from idpyoidc .server .session .token import RefreshToken
2323from idpyoidc .server .session .token import SessionToken
2424from idpyoidc .server .token .exception import UnknownToken
2525from idpyoidc .time_util import utc_time_sans_frac
@@ -36,7 +36,7 @@ def __init__(self, endpoint, config=None):
3636 self .error_cls = self .endpoint .error_cls
3737
3838 def post_parse_request (
39- self , request : Union [Message , dict ], client_id : Optional [str ] = "" , ** kwargs
39+ self , request : Union [Message , dict ], client_id : Optional [str ] = "" , ** kwargs
4040 ):
4141 """Context specific parsing of the request.
4242 This is done after general request parsing and before processing
@@ -49,15 +49,15 @@ def process_request(self, req: Union[Message, dict], **kwargs):
4949 raise NotImplementedError
5050
5151 def _mint_token (
52- self ,
53- token_class : str ,
54- grant : Grant ,
55- session_id : str ,
56- client_id : str ,
57- based_on : Optional [SessionToken ] = None ,
58- scope : Optional [list ] = None ,
59- token_args : Optional [dict ] = None ,
60- token_type : Optional [str ] = "" ,
52+ self ,
53+ token_class : str ,
54+ grant : Grant ,
55+ session_id : str ,
56+ client_id : str ,
57+ based_on : Optional [SessionToken ] = None ,
58+ scope : Optional [list ] = None ,
59+ token_args : Optional [dict ] = None ,
60+ token_type : Optional [str ] = "" ,
6161 ) -> SessionToken :
6262 _context = self .endpoint .server_get ("endpoint_context" )
6363 _mngr = _context .session_manager
@@ -171,9 +171,9 @@ def process_request(self, req: Union[Message, dict], **kwargs):
171171 _response ["expires_in" ] = token .expires_at - utc_time_sans_frac ()
172172
173173 if (
174- issue_refresh
175- and "refresh_token" in _supports_minting
176- and "refresh_token" in grant_types_supported
174+ issue_refresh
175+ and "refresh_token" in _supports_minting
176+ and "refresh_token" in grant_types_supported
177177 ):
178178 try :
179179 refresh_token = self ._mint_token (
@@ -196,7 +196,7 @@ def process_request(self, req: Union[Message, dict], **kwargs):
196196 return _response
197197
198198 def post_parse_request (
199- self , request : Union [Message , dict ], client_id : Optional [str ] = "" , ** kwargs
199+ self , request : Union [Message , dict ], client_id : Optional [str ] = "" , ** kwargs
200200 ):
201201 """
202202 This is where clients come to get their access tokens
@@ -300,9 +300,9 @@ def process_request(self, req: Union[Message, dict], **kwargs):
300300 token .register_usage ()
301301
302302 if (
303- "client_id" in req
304- and req ["client_id" ] in _context .cdb
305- and "revoke_refresh_on_issue" in _context .cdb [req ["client_id" ]]
303+ "client_id" in req
304+ and req ["client_id" ] in _context .cdb
305+ and "revoke_refresh_on_issue" in _context .cdb [req ["client_id" ]]
306306 ):
307307 revoke_refresh = _context .cdb [req ["client_id" ]].get ("revoke_refresh_on_issue" )
308308 else :
@@ -314,7 +314,7 @@ def process_request(self, req: Union[Message, dict], **kwargs):
314314 return _resp
315315
316316 def post_parse_request (
317- self , request : Union [Message , dict ], client_id : Optional [str ] = "" , ** kwargs
317+ self , request : Union [Message , dict ], client_id : Optional [str ] = "" , ** kwargs
318318 ):
319319 """
320320 This is where clients come to refresh their access tokens
@@ -405,10 +405,10 @@ def post_parse_request(self, request, client_id="", **kwargs):
405405 try :
406406 request .verify (keyjar = keyjar , opponent_id = client_id )
407407 except (
408- MissingRequiredAttribute ,
409- ValueError ,
410- MissingRequiredValue ,
411- JWKESTException ,
408+ MissingRequiredAttribute ,
409+ ValueError ,
410+ MissingRequiredValue ,
411+ JWKESTException ,
412412 ) as err :
413413 return self .endpoint .error_cls (error = "invalid_request" , error_description = "%s" % err )
414414
@@ -449,8 +449,8 @@ def _enforce_policy(self, request, token, config):
449449 )
450450
451451 if (
452- "requested_token_type" in request
453- and request ["requested_token_type" ] not in config ["requested_token_types_supported" ]
452+ "requested_token_type" in request
453+ and request ["requested_token_type" ] not in config ["requested_token_types_supported" ]
454454 ):
455455 return TokenErrorResponse (
456456 error = "invalid_request" ,
@@ -605,14 +605,14 @@ def validate_token_exchange_policy(request, context, subject_token, **kwargs):
605605 )
606606
607607 if (
608- "requested_token_type" in request
609- and request ["requested_token_type" ] == "urn:ietf:params:oauth:token-type:refresh_token"
608+ "requested_token_type" in request
609+ and request ["requested_token_type" ] == "urn:ietf:params:oauth:token-type:refresh_token"
610610 ):
611611 if "offline_access" not in subject_token .scope :
612612 return TokenErrorResponse (
613613 error = "invalid_request" ,
614614 error_description = f"Exchange { request ['subject_token_type' ]} to refresh token "
615- f"forbbiden" ,
615+ f"forbbiden" ,
616616 )
617617
618618 if "scope" in request :
0 commit comments