Skip to content

Commit bc68621

Browse files
committed
chore: lint fixes
1 parent f43ef30 commit bc68621

File tree

3 files changed

+20
-14
lines changed

3 files changed

+20
-14
lines changed

lib/sdk/clients/browser/authcode-with-pkce.ts

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,10 @@ const createAuthCodeWithPKCEClient = (options: BrowserPKCEClientOptions) => {
114114
if (!(await isAuthenticated())) {
115115
throw new Error('Cannot get user details, no authentication credential found');
116116
}
117-
return (await utilities.getUserFromSession(sessionManager, client.tokenValidationDetails))!;
117+
return (await utilities.getUserFromSession(
118+
sessionManager,
119+
client.tokenValidationDetails
120+
))!;
118121
};
119122

120123
/**

lib/sdk/clients/server/authorization-code.ts

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,10 @@ const createAuthorizationCodeClient = (
139139
if (!(await isAuthenticated(sessionManager))) {
140140
throw new Error('Cannot get user details, no authentication credential found');
141141
}
142-
return (await utilities.getUserFromSession(sessionManager, client.tokenValidationDetails))!;
142+
return (await utilities.getUserFromSession(
143+
sessionManager,
144+
client.tokenValidationDetails
145+
))!;
143146
};
144147

145148
/**

lib/sdk/utilities/token-claims.ts

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ import { jwtDecoder } from '@kinde/jwt-decoder';
55
/**
66
* Method extracts the provided claim from the provided token type in the
77
* current session.
8-
*
8+
*
99
* Security Model: This function assumes tokens have been cryptographically
1010
* validated during session commit via commitTokensToSession. It performs
1111
* decoding only on pre-validated tokens without re-validation by design.
12-
*
12+
*
1313
* @param {SessionManager} sessionManager
1414
* @param {string} claim
1515
* @param {ClaimTokenType} type
@@ -29,11 +29,11 @@ export const getClaimValue = async (
2929
/**
3030
* Method extracts the provided claim from the provided token type in the
3131
* current session, the returned object includes the provided claim.
32-
*
32+
*
3333
* Security Model: This function assumes tokens have been cryptographically
3434
* validated during session commit via commitTokensToSession. It performs
3535
* decoding only on pre-validated tokens without re-validation by design.
36-
*
36+
*
3737
* @param {SessionManager} sessionManager
3838
* @param {string} claim
3939
* @param {ClaimTokenType} type
@@ -54,11 +54,11 @@ export const getClaim = async (
5454
* Method returns the organization code from the current session and returns
5555
* a boolean in the returned object indicating if the provided permission is
5656
* present in the session.
57-
*
57+
*
5858
* Security Model: This function assumes tokens have been cryptographically
5959
* validated during session commit via commitTokensToSession. It performs
6060
* decoding only on pre-validated tokens without re-validation by design.
61-
*
61+
*
6262
* @param {SessionManager} sessionManager
6363
* @param {string} name
6464
* @returns {{ orgCode: string | null, isGranted: boolean }}
@@ -83,11 +83,11 @@ export const getPermission = async (
8383

8484
/**
8585
* Method extracts the organization code from the current session.
86-
*
86+
*
8787
* Security Model: This function assumes tokens have been cryptographically
8888
* validated during session commit via commitTokensToSession. It performs
8989
* decoding only on pre-validated tokens without re-validation by design.
90-
*
90+
*
9191
* @param {SessionManager} sessionManager
9292
* @returns {{ orgCode: string | null }}
9393
*/
@@ -102,11 +102,11 @@ export const getOrganization = async (
102102
/**
103103
* Method extracts all the permission and the organization code in the access
104104
* token in the current session.
105-
*
105+
*
106106
* Security Model: This function assumes tokens have been cryptographically
107107
* validated during session commit via commitTokensToSession. It performs
108108
* decoding only on pre-validated tokens without re-validation by design.
109-
*
109+
*
110110
* @param {SessionManager} sessionManager
111111
* @returns {{ permissions: string[], orgCode: string | null }}
112112
*/
@@ -130,11 +130,11 @@ export const getPermissions = async (
130130
/**
131131
* Method extracts all organization codes from the id token in the current
132132
* session.
133-
*
133+
*
134134
* Security Model: This function assumes tokens have been cryptographically
135135
* validated during session commit via commitTokensToSession. It performs
136136
* decoding only on pre-validated tokens without re-validation by design.
137-
*
137+
*
138138
* @param {SessionManager} sessionManager
139139
* @returns {{ orgCodes: string[] }}
140140
*/

0 commit comments

Comments
 (0)