@@ -227,7 +227,7 @@ def _verified_token(self,encoded_token: str, issuer: Optional[str] = None) -> Di
227
227
except Exception as err :
228
228
raise JWTDecodeError (status_code = 422 ,message = str (err ))
229
229
230
- def has_token_in_denylist_callback (self ) -> bool :
230
+ def _has_token_in_denylist_callback (self ) -> bool :
231
231
"""
232
232
Return True if token denylist callback set
233
233
"""
@@ -242,7 +242,7 @@ def _check_token_is_revoked(self, raw_token: Dict[str,Union[str,int,bool]]) -> N
242
242
if not self ._denylist_enabled :
243
243
return
244
244
245
- if not self .has_token_in_denylist_callback ():
245
+ if not self ._has_token_in_denylist_callback ():
246
246
raise RuntimeError ("A token_in_denylist_callback must be provided via "
247
247
"the '@AuthJWT.token_in_denylist_loader' if "
248
248
"AUTHJWT_DENYLIST_ENABLED is 'True'" )
@@ -346,7 +346,7 @@ def jwt_required(self) -> None:
346
346
if not self ._token :
347
347
raise MissingHeaderError (status_code = 401 ,message = "Missing {} Header" .format (self ._header_name ))
348
348
349
- if self .get_raw_jwt ()[ 'type' ] != 'access' :
349
+ if self ._get_type_token () != 'access' :
350
350
raise AccessTokenRequired (status_code = 422 ,message = "Only access tokens are allowed" )
351
351
352
352
def jwt_optional (self ) -> None :
@@ -360,7 +360,7 @@ def jwt_optional(self) -> None:
360
360
if self ._token :
361
361
self ._verifying_token (encoded_token = self ._token ,issuer = self ._decode_issuer )
362
362
363
- if self ._token and self .get_raw_jwt ()[ 'type' ] != 'access' :
363
+ if self ._token and self ._get_type_token () != 'access' :
364
364
raise AccessTokenRequired (status_code = 422 ,message = "Only access tokens are allowed" )
365
365
366
366
def jwt_refresh_token_required (self ) -> None :
@@ -375,7 +375,7 @@ def jwt_refresh_token_required(self) -> None:
375
375
if not self ._token :
376
376
raise MissingHeaderError (status_code = 401 ,message = "Missing {} Header" .format (self ._header_name ))
377
377
378
- if self .get_raw_jwt ()[ 'type' ] != 'refresh' :
378
+ if self ._get_type_token () != 'refresh' :
379
379
raise RefreshTokenRequired (status_code = 422 ,message = "Only refresh tokens are allowed" )
380
380
381
381
def fresh_jwt_required (self ) -> None :
@@ -390,12 +390,18 @@ def fresh_jwt_required(self) -> None:
390
390
if not self ._token :
391
391
raise MissingHeaderError (status_code = 401 ,message = "Missing {} Header" .format (self ._header_name ))
392
392
393
- if self .get_raw_jwt ()[ 'type' ] != 'access' :
393
+ if self ._get_type_token () != 'access' :
394
394
raise AccessTokenRequired (status_code = 422 ,message = "Only access tokens are allowed" )
395
395
396
- if not self .get_raw_jwt ()[ 'fresh' ] :
396
+ if not self ._get_fresh_token () :
397
397
raise FreshTokenRequired (status_code = 401 ,message = "Fresh token required" )
398
398
399
+ def _get_type_token (self ) -> str :
400
+ return self .get_raw_jwt ()['type' ]
401
+
402
+ def _get_fresh_token (self ) -> bool :
403
+ return self .get_raw_jwt ()['fresh' ]
404
+
399
405
def get_raw_jwt (self ) -> Optional [Dict [str ,Union [str ,int ,bool ]]]:
400
406
"""
401
407
this will return the python dictionary which has all of the claims of the JWT that is accessing the endpoint.
0 commit comments