(admin-of conn user-id)
Inputs: [conn user-id :- lib-schema/UniqueID] Returns: (schema/maybe [lib-schema/UniqueID])
Given the user-id of the user, return a sequence of team-ids for the teams the user is an admin of.
Requires a conn to the auth DB.
Inputs: [conn user-id :- lib-schema/UniqueID] Returns: (schema/maybe [lib-schema/UniqueID]) Given the user-id of the user, return a sequence of team-ids for the teams the user is an admin of. Requires a conn to the auth DB.
(bots-for conn user)
(bots-for conn user :guard (fn* [p1__36564#] (empty? (:teams p1__36564#))))
Given a user, return a map of configured bots for each of the user's teams, keyed by team-id.
Requires a conn to the auth DB.
Given a user, return a map of configured bots for each of the user's teams, keyed by team-id. Requires a conn to the auth DB.
(check-token token passphrase)
Verify a JSON Web Token with the passphrase that was (presumably) used to generate it.
Verify a JSON Web Token with the passphrase that was (presumably) used to generate it.
(creation payload)
Set a creation time property in the JWToken payload.
Set a creation time property in the JWToken payload.
(decode-id-token token passphrase)
Decode the id-token. The first version of the id-token had :team-id key instead of :teams and it was released on production for digest only. To avoid breaking those links let's move :team-id into :teams (as list) when the id-token is being decoded.
Decode the id-token. The first version of the id-token had :team-id key instead of :teams and it was released on production for digest only. To avoid breaking those links let's move :team-id into :teams (as list) when the id-token is being decoded.
(expire payload)
Set an expire property in the JWToken payload, longer if there's a bot, shorter if not.
Set an expire property in the JWToken payload, longer if there's a bot, shorter if not.
(expire-time payload)
Given a token payload return the expiring date depending on the token content.
Given a token payload return the expiring date depending on the token content.
(generate payload passphrase)
Create a JSON Web Token from a payload.
Create a JSON Web Token from a payload.
(-sign this payload)
Generate JWT for given payload
Generate JWT for given payload
(-unsign this token)
Decode a given JWT, nil if not verifiable or otherwise broken
Decode a given JWT, nil if not verifiable or otherwise broken
(name-for user)
(name-for first last)
Fn moved to lib.user ns. Here for backwards compatability.
Fn moved to lib.user ns. Here for backwards compatability.
(premium-teams conn user-id)
Inputs: [conn :- lib-schema/Conn user-id :- lib-schema/UniqueID] Returns: (schema/maybe [lib-schema/UniqueID])
Given the user-id of the user, return a sequence of team-ids for the teams the user is an admin of.
Requires a conn to the auth DB.
Inputs: [conn :- lib-schema/Conn user-id :- lib-schema/UniqueID] Returns: (schema/maybe [lib-schema/UniqueID]) Given the user-id of the user, return a sequence of team-ids for the teams the user is an admin of. Requires a conn to the auth DB.
(refresh? jwt-claims :guard map?)
(refresh? jwtoken :guard string?)
Return true/false if the JWToken needs to be refreshed. Can happen when the token is actually expired or if it's an old format: see lib-schema/ValidJWTClaims and lib-schema/Claims diffs..
Return true/false if the JWToken needs to be refreshed. Can happen when the token is actually expired or if it's an old format: see lib-schema/ValidJWTClaims and lib-schema/Claims diffs..
cljdoc is a website building & hosting documentation for Clojure/Script libraries
× close