Skip to content

Commit 2eef9d4

Browse files
committed
Remove unused imports and make format
1 parent 8a11d73 commit 2eef9d4

File tree

5 files changed

+9
-16
lines changed

5 files changed

+9
-16
lines changed

lib/galaxy/authnz/oidc_utils.py

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,8 @@
66
"""
77

88
import logging
9-
from typing import Optional
109

1110
import jwt
12-
from jwt import InvalidTokenError
1311
from social_core.backends.open_id_connect import OpenIdConnectAuth
1412

1513
from galaxy.exceptions import MalformedContents

lib/galaxy/authnz/psa_authnz.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@
1111
do_complete,
1212
do_disconnect,
1313
)
14-
from social_core.backends.open_id_connect import OpenIdConnectAuth
1514
from social_core.backends.utils import get_backend
1615
from social_core.strategy import BaseStrategy
1716
from social_core.utils import (

lib/galaxy/model/migrations/data_fixes/custos_to_psa.py

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
"""Reusable helpers for migrating Custos authentication tokens into PSA format."""
22

3-
import jwt
43
from datetime import datetime
54
from typing import (
65
cast,
76
Optional,
87
)
98

9+
import jwt
1010
from sqlalchemy import (
1111
Column,
1212
DateTime,
@@ -26,7 +26,7 @@
2626
CUSTOS_ASSOC_TYPE = "custos_migrated"
2727

2828

29-
def _extract_iat_from_token(token: str) -> Optional[int]:
29+
def _extract_iat_from_token(token: Optional[str]) -> Optional[int]:
3030
"""
3131
Extract the 'iat' (issued at) claim from a JWT token.
3232
Returns None if the token cannot be decoded or doesn't have an iat claim.
@@ -110,11 +110,7 @@ def migrate_custos_tokens_to_psa(
110110
# Extract auth_time from token's 'iat' claim (issued at time)
111111
# Priority: access_token.iat > id_token.iat > current time
112112
# We prefer access_token.iat since that's the token whose expiration we're tracking
113-
auth_time = (
114-
_extract_iat_from_token(record.access_token)
115-
or _extract_iat_from_token(record.id_token)
116-
or now_ts
117-
)
113+
auth_time = _extract_iat_from_token(record.access_token) or _extract_iat_from_token(record.id_token) or now_ts
118114
extra_data["auth_time"] = auth_time
119115

120116
# Calculate expires from expiration_time

test/unit/authnz/test_psa_authnz.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ def test_decode_access_token():
197197
mock_backend.strategy.config = {"accepted_audiences": dummy_access_token.access_token_data["aud"]}
198198
mock_backend.id_token_issuer.return_value = dummy_access_token.access_token_data["iss"]
199199
# Make isinstance() checks pass by setting __class__ after configuring the mock
200-
mock_backend.__class__ = OpenIdConnectAuth
200+
mock_backend.__class__ = OpenIdConnectAuth # type: ignore[assignment]
201201
# Check that access token is decoded successfully to return the original data
202202
data = decode_access_token(social=mock_social, backend=mock_backend)
203203
assert data["access_token"] == dummy_access_token.access_token_data
@@ -219,7 +219,7 @@ def test_decode_access_token_invalid_key():
219219
mock_backend.strategy.config = {"accepted_audiences": dummy_access_token.access_token_data["aud"]}
220220
mock_backend.id_token_issuer.return_value = dummy_access_token.access_token_data["iss"]
221221
# Make isinstance() checks pass by setting __class__ after configuring the mock
222-
mock_backend.__class__ = OpenIdConnectAuth
222+
mock_backend.__class__ = OpenIdConnectAuth # type: ignore[assignment]
223223
# Test that the decode function returns None for the access token
224224
result = decode_access_token(social=mock_social, backend=mock_backend)
225225
assert result["access_token"] is None
@@ -244,7 +244,7 @@ def test_decode_access_token_invalid_issuer():
244244
mock_backend.strategy.config = {"accepted_audiences": dummy_access_token.access_token_data["aud"]}
245245
mock_backend.id_token_issuer.return_value = "https://validissuer.com"
246246
# Make isinstance() checks pass by setting __class__ after configuring the mock
247-
mock_backend.__class__ = OpenIdConnectAuth
247+
mock_backend.__class__ = OpenIdConnectAuth # type: ignore[assignment]
248248
# Test that the decode function returns None for the access token
249249
result = decode_access_token(social=mock_social, backend=mock_backend)
250250
assert result["access_token"] is None
@@ -269,7 +269,7 @@ def test_decode_access_token_invalid_audience():
269269
mock_backend.strategy.config = {"accepted_audiences": ["https://validaudience.url"]}
270270
mock_backend.id_token_issuer.return_value = dummy_access_token.access_token_data["iss"]
271271
# Make isinstance() checks pass by setting __class__ after configuring the mock
272-
mock_backend.__class__ = OpenIdConnectAuth
272+
mock_backend.__class__ = OpenIdConnectAuth # type: ignore[assignment]
273273
# Test that the decode function returns None for the access token
274274
result = decode_access_token(social=mock_social, backend=mock_backend)
275275
assert result["access_token"] is None

test/unit/data/model/test_migrate_custos_to_psa.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@
55
from custos_authnz_token to oidc_user_authnz_tokens.
66
"""
77

8-
import jwt
98
from datetime import (
109
datetime,
1110
timedelta,
1211
)
1312
from typing import Any
1413

14+
import jwt
1515
import pytest
1616
from sqlalchemy import (
1717
Column,
@@ -29,8 +29,8 @@
2929

3030
from galaxy.model.custom_types import MutableJSONType
3131
from galaxy.model.migrations.data_fixes.custos_to_psa import (
32-
CUSTOS_ASSOC_TYPE,
3332
_extract_iat_from_token,
33+
CUSTOS_ASSOC_TYPE,
3434
migrate_custos_tokens_to_psa,
3535
remove_migrated_psa_tokens,
3636
restore_custos_tokens_from_psa,

0 commit comments

Comments
 (0)