Skip to content

Commit bd19ce5

Browse files
committed
- Removed unused parameters from the EnterpriseAuthOAuthClientProvider class.
- Updated docstring for decode_id_jag method.
1 parent bd5f741 commit bd19ce5

File tree

1 file changed

+1
-7
lines changed

1 file changed

+1
-7
lines changed

src/mcp/client/auth/extensions/enterprise_managed_auth.py

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -185,8 +185,6 @@ def __init__(
185185
storage: TokenStorage,
186186
idp_token_endpoint: str,
187187
token_exchange_params: TokenExchangeParameters,
188-
redirect_handler: Callable[[str], Awaitable[None]] | None = None,
189-
callback_handler: Callable[[], Awaitable[tuple[str, str | None]]] | None = None,
190188
timeout: float = 300.0,
191189
) -> None:
192190
"""Initialize Enterprise Auth OAuth Client.
@@ -197,16 +195,12 @@ def __init__(
197195
storage: Token storage implementation
198196
idp_token_endpoint: Enterprise IdP token endpoint URL
199197
token_exchange_params: Token exchange parameters
200-
redirect_handler: Optional redirect handler
201-
callback_handler: Optional callback handler
202198
timeout: Request timeout in seconds
203199
"""
204200
super().__init__(
205201
server_url=server_url,
206202
client_metadata=client_metadata,
207203
storage=storage,
208-
redirect_handler=redirect_handler,
209-
callback_handler=callback_handler,
210204
timeout=timeout,
211205
)
212206
self.idp_token_endpoint = idp_token_endpoint
@@ -384,7 +378,7 @@ def decode_id_jag(id_jag: str) -> IDJAGClaims:
384378
Decoded ID-JAG claims
385379
386380
Note:
387-
For verification, use server-side validation instead.
381+
This function does not verify the JWT, instead relying on the receiving server to validate it.
388382
"""
389383
# Decode without verification for inspection
390384
claims = jwt.decode(id_jag, options={"verify_signature": False})

0 commit comments

Comments
 (0)