diff --git a/gso/auth/oidc_policy_helper.py b/gso/auth/oidc_policy_helper.py
index 1630ee48bfc6253abc86233ee82f0ece116aea09..b5f93a81dee11f34d994bdbebabec25077cd8726 100644
--- a/gso/auth/oidc_policy_helper.py
+++ b/gso/auth/oidc_policy_helper.py
@@ -188,13 +188,13 @@ class OIDCUser(HTTPBearer):
resource_server_secret: str
def __init__(
- self,
- openid_url: str,
- resource_server_id: str,
- resource_server_secret: str,
- *,
- auto_error: bool = True,
- scheme_name: str | None = None,
+ self,
+ openid_url: str,
+ resource_server_id: str,
+ resource_server_secret: str,
+ *,
+ auto_error: bool = True,
+ scheme_name: str | None = None,
):
"""Set up OIDCUser with specified OpenID Connect configurations and credentials."""
super().__init__(auto_error=auto_error)
@@ -204,7 +204,7 @@ class OIDCUser(HTTPBearer):
self.scheme_name = scheme_name or self.__class__.__name__
async def __call__( # type: ignore[override]
- self, request: Request, token: str | None = None
+ self, request: Request, token: str | None = None
) -> OIDCUserModel | None:
"""Return the OIDC user from OIDC introspect endpoint.
@@ -242,7 +242,7 @@ class OIDCUser(HTTPBearer):
user_info = await self.userinfo(async_request, token)
- user_info['client_id'] = intercepted_token.get("client_id")
+ user_info["client_id"] = intercepted_token.get("client_id")
logger.debug("OIDCUserModel object.", intercepted_token=intercepted_token)
return user_info
@@ -367,11 +367,11 @@ def _evaluate_decision(decision: OPAResult, *, auto_error: bool, **context: dict
def opa_decision(
- opa_url: str,
- oidc_security: OIDCUser,
- *,
- auto_error: bool = True,
- opa_kwargs: Mapping[str, str] | None = None,
+ opa_url: str,
+ oidc_security: OIDCUser,
+ *,
+ auto_error: bool = True,
+ opa_kwargs: Mapping[str, str] | None = None,
) -> Callable[[Request, OIDCUserModel, AsyncClient], Awaitable[bool | None]]:
"""Create a decision function for Open Policy Agent (OPA) authorization checks.
@@ -388,9 +388,9 @@ def opa_decision(
"""
async def _opa_decision(
- request: Request,
- user_info: OIDCUserModel = Depends(oidc_security), # noqa: B008
- async_request: AsyncClient = Depends(_make_async_client), # noqa: B008
+ request: Request,
+ user_info: OIDCUserModel = Depends(oidc_security), # noqa: B008
+ async_request: AsyncClient = Depends(_make_async_client), # noqa: B008
) -> bool | None:
"""Check OIDCUserModel against the OPA policy.