diff --git a/v2/emailpassword/common-customizations/sessions/session-verification-in-api/get-session.mdx b/v2/emailpassword/common-customizations/sessions/session-verification-in-api/get-session.mdx index f868a3c10..94a21fa6d 100644 --- a/v2/emailpassword/common-customizations/sessions/session-verification-in-api/get-session.mdx +++ b/v2/emailpassword/common-customizations/sessions/session-verification-in-api/get-session.mdx @@ -1113,7 +1113,7 @@ function verifySession(options?: VerifySessionOptions) { // Or you can call the errorHandler middleware as shown below } else if (err.type === Session.Error.INVALID_CLAIMS) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } // OR you can use this errorHandler which will @@ -1164,7 +1164,7 @@ func VerifySession(options *sessmodels.VerifySessionOptions, otherHandler http.H // Or you can call the errorHandler middleware as shown below } else if defaultErrors.As(err, &errors.InvalidClaimError{}) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } // OR you can use this errorHandler which will @@ -1248,7 +1248,7 @@ def verify_session( pass if isinstance(e, InvalidClaimsError): # The user is missing some required claim. - # You can pass the missing claims to the frontend and handle it there + # You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. pass # OR you can raise this error which will @@ -1306,7 +1306,7 @@ async function verifySession(accessToken: string, antiCsrfToken?: string, option // Or you can call the errorHandler middleware as shown below } else if (err.type === Session.Error.INVALID_CLAIMS) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } } throw err; @@ -1357,7 +1357,7 @@ func VerifySession(accessToken string, antiCsrfToken *string, options *sessmodel // Or you can call the errorHandler middleware as shown below } else if defaultErrors.As(err, &errors.InvalidClaimError{}) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } else { // TODO: send a 500 error to the frontend } @@ -1437,7 +1437,7 @@ def verify_session( pass if isinstance(e, InvalidClaimsError): # The user is missing some required claim. - # You can pass the missing claims to the frontend and handle it there + # You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. pass # OR you can raise this error which will diff --git a/v2/passwordless/common-customizations/sessions/session-verification-in-api/get-session.mdx b/v2/passwordless/common-customizations/sessions/session-verification-in-api/get-session.mdx index f868a3c10..94a21fa6d 100644 --- a/v2/passwordless/common-customizations/sessions/session-verification-in-api/get-session.mdx +++ b/v2/passwordless/common-customizations/sessions/session-verification-in-api/get-session.mdx @@ -1113,7 +1113,7 @@ function verifySession(options?: VerifySessionOptions) { // Or you can call the errorHandler middleware as shown below } else if (err.type === Session.Error.INVALID_CLAIMS) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } // OR you can use this errorHandler which will @@ -1164,7 +1164,7 @@ func VerifySession(options *sessmodels.VerifySessionOptions, otherHandler http.H // Or you can call the errorHandler middleware as shown below } else if defaultErrors.As(err, &errors.InvalidClaimError{}) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } // OR you can use this errorHandler which will @@ -1248,7 +1248,7 @@ def verify_session( pass if isinstance(e, InvalidClaimsError): # The user is missing some required claim. - # You can pass the missing claims to the frontend and handle it there + # You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. pass # OR you can raise this error which will @@ -1306,7 +1306,7 @@ async function verifySession(accessToken: string, antiCsrfToken?: string, option // Or you can call the errorHandler middleware as shown below } else if (err.type === Session.Error.INVALID_CLAIMS) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } } throw err; @@ -1357,7 +1357,7 @@ func VerifySession(accessToken string, antiCsrfToken *string, options *sessmodel // Or you can call the errorHandler middleware as shown below } else if defaultErrors.As(err, &errors.InvalidClaimError{}) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } else { // TODO: send a 500 error to the frontend } @@ -1437,7 +1437,7 @@ def verify_session( pass if isinstance(e, InvalidClaimsError): # The user is missing some required claim. - # You can pass the missing claims to the frontend and handle it there + # You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. pass # OR you can raise this error which will diff --git a/v2/session/common-customizations/sessions/session-verification-in-api/get-session.mdx b/v2/session/common-customizations/sessions/session-verification-in-api/get-session.mdx index c6d2f478c..fc2df03a1 100644 --- a/v2/session/common-customizations/sessions/session-verification-in-api/get-session.mdx +++ b/v2/session/common-customizations/sessions/session-verification-in-api/get-session.mdx @@ -1113,7 +1113,7 @@ function verifySession(options?: VerifySessionOptions) { // Or you can call the errorHandler middleware as shown below } else if (err.type === Session.Error.INVALID_CLAIMS) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } // OR you can use this errorHandler which will @@ -1164,7 +1164,7 @@ func VerifySession(options *sessmodels.VerifySessionOptions, otherHandler http.H // Or you can call the errorHandler middleware as shown below } else if defaultErrors.As(err, &errors.InvalidClaimError{}) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } // OR you can use this errorHandler which will @@ -1248,7 +1248,7 @@ def verify_session( pass if isinstance(e, InvalidClaimsError): # The user is missing some required claim. - # You can pass the missing claims to the frontend and handle it there + # You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. pass # OR you can raise this error which will @@ -1306,7 +1306,7 @@ async function verifySession(accessToken: string, antiCsrfToken?: string, option // Or you can call the errorHandler middleware as shown below } else if (err.type === Session.Error.INVALID_CLAIMS) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } } throw err; @@ -1357,7 +1357,7 @@ func VerifySession(accessToken string, antiCsrfToken *string, options *sessmodel // Or you can call the errorHandler middleware as shown below } else if defaultErrors.As(err, &errors.InvalidClaimError{}) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } else { // TODO: send a 500 error to the frontend } @@ -1437,7 +1437,7 @@ def verify_session( pass if isinstance(e, InvalidClaimsError): # The user is missing some required claim. - # You can pass the missing claims to the frontend and handle it there + # You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. pass # OR you can raise this error which will diff --git a/v2/thirdparty/common-customizations/sessions/session-verification-in-api/get-session.mdx b/v2/thirdparty/common-customizations/sessions/session-verification-in-api/get-session.mdx index f868a3c10..94a21fa6d 100644 --- a/v2/thirdparty/common-customizations/sessions/session-verification-in-api/get-session.mdx +++ b/v2/thirdparty/common-customizations/sessions/session-verification-in-api/get-session.mdx @@ -1113,7 +1113,7 @@ function verifySession(options?: VerifySessionOptions) { // Or you can call the errorHandler middleware as shown below } else if (err.type === Session.Error.INVALID_CLAIMS) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } // OR you can use this errorHandler which will @@ -1164,7 +1164,7 @@ func VerifySession(options *sessmodels.VerifySessionOptions, otherHandler http.H // Or you can call the errorHandler middleware as shown below } else if defaultErrors.As(err, &errors.InvalidClaimError{}) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } // OR you can use this errorHandler which will @@ -1248,7 +1248,7 @@ def verify_session( pass if isinstance(e, InvalidClaimsError): # The user is missing some required claim. - # You can pass the missing claims to the frontend and handle it there + # You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. pass # OR you can raise this error which will @@ -1306,7 +1306,7 @@ async function verifySession(accessToken: string, antiCsrfToken?: string, option // Or you can call the errorHandler middleware as shown below } else if (err.type === Session.Error.INVALID_CLAIMS) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } } throw err; @@ -1357,7 +1357,7 @@ func VerifySession(accessToken string, antiCsrfToken *string, options *sessmodel // Or you can call the errorHandler middleware as shown below } else if defaultErrors.As(err, &errors.InvalidClaimError{}) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } else { // TODO: send a 500 error to the frontend } @@ -1437,7 +1437,7 @@ def verify_session( pass if isinstance(e, InvalidClaimsError): # The user is missing some required claim. - # You can pass the missing claims to the frontend and handle it there + # You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. pass # OR you can raise this error which will diff --git a/v2/thirdpartyemailpassword/common-customizations/sessions/session-verification-in-api/get-session.mdx b/v2/thirdpartyemailpassword/common-customizations/sessions/session-verification-in-api/get-session.mdx index f868a3c10..94a21fa6d 100644 --- a/v2/thirdpartyemailpassword/common-customizations/sessions/session-verification-in-api/get-session.mdx +++ b/v2/thirdpartyemailpassword/common-customizations/sessions/session-verification-in-api/get-session.mdx @@ -1113,7 +1113,7 @@ function verifySession(options?: VerifySessionOptions) { // Or you can call the errorHandler middleware as shown below } else if (err.type === Session.Error.INVALID_CLAIMS) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } // OR you can use this errorHandler which will @@ -1164,7 +1164,7 @@ func VerifySession(options *sessmodels.VerifySessionOptions, otherHandler http.H // Or you can call the errorHandler middleware as shown below } else if defaultErrors.As(err, &errors.InvalidClaimError{}) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } // OR you can use this errorHandler which will @@ -1248,7 +1248,7 @@ def verify_session( pass if isinstance(e, InvalidClaimsError): # The user is missing some required claim. - # You can pass the missing claims to the frontend and handle it there + # You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. pass # OR you can raise this error which will @@ -1306,7 +1306,7 @@ async function verifySession(accessToken: string, antiCsrfToken?: string, option // Or you can call the errorHandler middleware as shown below } else if (err.type === Session.Error.INVALID_CLAIMS) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } } throw err; @@ -1357,7 +1357,7 @@ func VerifySession(accessToken string, antiCsrfToken *string, options *sessmodel // Or you can call the errorHandler middleware as shown below } else if defaultErrors.As(err, &errors.InvalidClaimError{}) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } else { // TODO: send a 500 error to the frontend } @@ -1437,7 +1437,7 @@ def verify_session( pass if isinstance(e, InvalidClaimsError): # The user is missing some required claim. - # You can pass the missing claims to the frontend and handle it there + # You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. pass # OR you can raise this error which will diff --git a/v2/thirdpartypasswordless/common-customizations/sessions/session-verification-in-api/get-session.mdx b/v2/thirdpartypasswordless/common-customizations/sessions/session-verification-in-api/get-session.mdx index f868a3c10..94a21fa6d 100644 --- a/v2/thirdpartypasswordless/common-customizations/sessions/session-verification-in-api/get-session.mdx +++ b/v2/thirdpartypasswordless/common-customizations/sessions/session-verification-in-api/get-session.mdx @@ -1113,7 +1113,7 @@ function verifySession(options?: VerifySessionOptions) { // Or you can call the errorHandler middleware as shown below } else if (err.type === Session.Error.INVALID_CLAIMS) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } // OR you can use this errorHandler which will @@ -1164,7 +1164,7 @@ func VerifySession(options *sessmodels.VerifySessionOptions, otherHandler http.H // Or you can call the errorHandler middleware as shown below } else if defaultErrors.As(err, &errors.InvalidClaimError{}) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } // OR you can use this errorHandler which will @@ -1248,7 +1248,7 @@ def verify_session( pass if isinstance(e, InvalidClaimsError): # The user is missing some required claim. - # You can pass the missing claims to the frontend and handle it there + # You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. pass # OR you can raise this error which will @@ -1306,7 +1306,7 @@ async function verifySession(accessToken: string, antiCsrfToken?: string, option // Or you can call the errorHandler middleware as shown below } else if (err.type === Session.Error.INVALID_CLAIMS) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } } throw err; @@ -1357,7 +1357,7 @@ func VerifySession(accessToken string, antiCsrfToken *string, options *sessmodel // Or you can call the errorHandler middleware as shown below } else if defaultErrors.As(err, &errors.InvalidClaimError{}) { // The user is missing some required claim. - // You can pass the missing claims to the frontend and handle it there + // You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. } else { // TODO: send a 500 error to the frontend } @@ -1437,7 +1437,7 @@ def verify_session( pass if isinstance(e, InvalidClaimsError): # The user is missing some required claim. - # You can pass the missing claims to the frontend and handle it there + # You can pass the missing claims to the frontend and handle it there. Send a 403 to the frontend. pass # OR you can raise this error which will