@@ -142,6 +142,8 @@ def cmd_oauth_refresh(ctx, scope):
142
142
It is possible to request a refresh token with scopes that are different
143
143
from what is currently possessed, but you will never be granted
144
144
more scopes than what the user has authorized.
145
+
146
+ This command only applies to auth profiles that use OAuth access tokens.
145
147
"""
146
148
saved_token = FileBackedOidcCredential (None , ctx .obj ["AUTH" ].token_file_path ())
147
149
auth_client = ctx .obj ["AUTH" ].auth_client ()
@@ -344,7 +346,8 @@ def cmd_oauth_revoke_refresh_token(ctx):
344
346
@recast_exceptions_to_click (AuthException , FileNotFoundError )
345
347
def cmd_oauth_userinfo (ctx ):
346
348
"""
347
- Look up user information from the auth server using the access token.
349
+ Look up user information for the current user. Look up is performed by
350
+ querying the authorization server using the current access token.
348
351
"""
349
352
saved_token = FileBackedOidcCredential (None , ctx .obj ["AUTH" ].token_file_path ())
350
353
auth_client = ctx .obj ["AUTH" ].auth_client ()
@@ -362,6 +365,7 @@ def cmd_oauth_userinfo(ctx):
362
365
def cmd_oauth_print_access_token (ctx , refresh ):
363
366
"""
364
367
Show the current OAuth access token. Stale tokens will be automatically refreshed.
368
+ This command only applies to auth profiles that use OAuth access tokens.
365
369
"""
366
370
saved_token = FileBackedOidcCredential (None , ctx .obj ["AUTH" ].token_file_path ())
367
371
saved_token .load ()
@@ -394,8 +398,8 @@ def cmd_oauth_print_access_token(ctx, refresh):
394
398
@recast_exceptions_to_click (AuthException , FileNotFoundError )
395
399
def cmd_oauth_decode_jwt_access_token (ctx , human_readable ):
396
400
"""
397
- Decode a JWT access token locally and display its contents. NO
398
- VALIDATION IS PERFORMED. This function is intended for local
401
+ Decode a JWT access token locally.
402
+ NO VALIDATION IS PERFORMED. This function is intended for local
399
403
debugging purposes. Note: Access tokens need not be JWTs.
400
404
This function will not work for authorization servers that issue
401
405
access tokens in other formats.
@@ -410,8 +414,8 @@ def cmd_oauth_decode_jwt_access_token(ctx, human_readable):
410
414
@recast_exceptions_to_click (AuthException , FileNotFoundError )
411
415
def cmd_oauth_decode_jwt_id_token (ctx , human_readable ):
412
416
"""
413
- Decode a JWT ID token locally and display its contents. NO
414
- VALIDATION IS PERFORMED. This function is intended for local
417
+ Decode a JWT ID token locally.
418
+ NO VALIDATION IS PERFORMED. This function is intended for local
415
419
debugging purposes.
416
420
"""
417
421
saved_token = FileBackedOidcCredential (None , ctx .obj ["AUTH" ].token_file_path ())
@@ -424,8 +428,8 @@ def cmd_oauth_decode_jwt_id_token(ctx, human_readable):
424
428
@recast_exceptions_to_click (AuthException , FileNotFoundError )
425
429
def cmd_oauth_decode_jwt_refresh_token (ctx , human_readable ):
426
430
"""
427
- Decode a JWT refresh token locally and display its contents. NO
428
- VALIDATION IS PERFORMED. This function is intended for local
431
+ Decode a JWT refresh token locally.
432
+ NO VALIDATION IS PERFORMED. This function is intended for local
429
433
debugging purposes. Note: Refresh tokens need not be JWTs.
430
434
This function will not work for authorization servers that issue
431
435
refresh tokens in other formats.
0 commit comments