Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add OAuth PKCE (Sourcery refactored) #332

Merged
merged 1 commit into from
Sep 25, 2023
Merged

feat: add OAuth PKCE (Sourcery refactored) #332

merged 1 commit into from
Sep 25, 2023

Conversation

sourcery-ai[bot]
Copy link
Contributor

@sourcery-ai sourcery-ai bot commented Sep 25, 2023

Pull Request #331 refactored by Sourcery.

If you're happy with these changes, merge this Pull Request using the Squash and merge strategy.

NOTE: As code is pushed to the original Pull Request, Sourcery will
re-run and update (force-push) this Pull Request with new refactorings as
necessary. If Sourcery finds no refactorings at any point, this Pull Request
will be closed automatically.

See our documentation here.

Run Sourcery locally

Reduce the feedback loop during development by using the Sourcery editor plugin:

Review changes via command line

To manually merge these changes, make sure you're on the j0/pkce branch, then run:

git fetch origin sourcery/j0/pkce
git merge --ff-only FETCH_HEAD
git reset HEAD^

Help us improve this pull request!

@sourcery-ai sourcery-ai bot requested a review from J0 September 25, 2023 15:05
# Generate a random PKCE verifier using the secrets module
verifier = "".join(secrets.choice(charset) for _ in range(length))

return verifier
return "".join(secrets.choice(charset) for _ in range(length))
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Function generate_pkce_verifier refactored with the following changes:

This removes the following comments ( why? ):

# Generate a random PKCE verifier using the secrets module

Comment on lines -152 to +149
# Encode the hash as URL-safe base64
base64_encoded = base64.urlsafe_b64encode(sha256_hash).rstrip(b"=").decode("utf-8")

return base64_encoded
return base64.urlsafe_b64encode(sha256_hash).rstrip(b"=").decode("utf-8")
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Function generate_pkce_challenge refactored with the following changes:

This removes the following comments ( why? ):

# Encode the hash as URL-safe base64

@J0 J0 merged commit b331d04 into j0/pkce Sep 25, 2023
0 of 8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant