@@ -5,11 +5,11 @@ import { jwtDecoder } from '@kinde/jwt-decoder';
5
5
/**
6
6
* Method extracts the provided claim from the provided token type in the
7
7
* current session.
8
- *
8
+ *
9
9
* Security Model: This function assumes tokens have been cryptographically
10
10
* validated during session commit via commitTokensToSession. It performs
11
11
* decoding only on pre-validated tokens without re-validation by design.
12
- *
12
+ *
13
13
* @param {SessionManager } sessionManager
14
14
* @param {string } claim
15
15
* @param {ClaimTokenType } type
@@ -29,11 +29,11 @@ export const getClaimValue = async (
29
29
/**
30
30
* Method extracts the provided claim from the provided token type in the
31
31
* current session, the returned object includes the provided claim.
32
- *
32
+ *
33
33
* Security Model: This function assumes tokens have been cryptographically
34
34
* validated during session commit via commitTokensToSession. It performs
35
35
* decoding only on pre-validated tokens without re-validation by design.
36
- *
36
+ *
37
37
* @param {SessionManager } sessionManager
38
38
* @param {string } claim
39
39
* @param {ClaimTokenType } type
@@ -54,11 +54,11 @@ export const getClaim = async (
54
54
* Method returns the organization code from the current session and returns
55
55
* a boolean in the returned object indicating if the provided permission is
56
56
* present in the session.
57
- *
57
+ *
58
58
* Security Model: This function assumes tokens have been cryptographically
59
59
* validated during session commit via commitTokensToSession. It performs
60
60
* decoding only on pre-validated tokens without re-validation by design.
61
- *
61
+ *
62
62
* @param {SessionManager } sessionManager
63
63
* @param {string } name
64
64
* @returns {{ orgCode: string | null, isGranted: boolean } }
@@ -83,11 +83,11 @@ export const getPermission = async (
83
83
84
84
/**
85
85
* Method extracts the organization code from the current session.
86
- *
86
+ *
87
87
* Security Model: This function assumes tokens have been cryptographically
88
88
* validated during session commit via commitTokensToSession. It performs
89
89
* decoding only on pre-validated tokens without re-validation by design.
90
- *
90
+ *
91
91
* @param {SessionManager } sessionManager
92
92
* @returns {{ orgCode: string | null } }
93
93
*/
@@ -102,11 +102,11 @@ export const getOrganization = async (
102
102
/**
103
103
* Method extracts all the permission and the organization code in the access
104
104
* token in the current session.
105
- *
105
+ *
106
106
* Security Model: This function assumes tokens have been cryptographically
107
107
* validated during session commit via commitTokensToSession. It performs
108
108
* decoding only on pre-validated tokens without re-validation by design.
109
- *
109
+ *
110
110
* @param {SessionManager } sessionManager
111
111
* @returns {{ permissions: string[], orgCode: string | null } }
112
112
*/
@@ -130,11 +130,11 @@ export const getPermissions = async (
130
130
/**
131
131
* Method extracts all organization codes from the id token in the current
132
132
* session.
133
- *
133
+ *
134
134
* Security Model: This function assumes tokens have been cryptographically
135
135
* validated during session commit via commitTokensToSession. It performs
136
136
* decoding only on pre-validated tokens without re-validation by design.
137
- *
137
+ *
138
138
* @param {SessionManager } sessionManager
139
139
* @returns {{ orgCodes: string[] } }
140
140
*/
0 commit comments