@@ -14,7 +14,7 @@ def get_jwt():
1414 """
1515 In a protected endpoint, this will return the python dictionary which has
1616 the payload of the JWT that is accessing the endpoint. If no JWT is present
17- due to `jwt_required(optional=True)`, an empty dictionary is returned.
17+ due to `` jwt_required(optional=True)` `, an empty dictionary is returned.
1818
1919 :return:
2020 The payload (claims) of the JWT in the current request
@@ -32,7 +32,7 @@ def get_jwt_header():
3232 """
3333 In a protected endpoint, this will return the python dictionary which has
3434 the header of the JWT that is accessing the endpoint. If no JWT is present
35- due to `jwt_required(optional=True)`, an empty dictionary is returned.
35+ due to `` jwt_required(optional=True)` `, an empty dictionary is returned.
3636
3737 :return:
3838 The headers of the JWT in the current request
@@ -50,7 +50,7 @@ def get_jwt_identity():
5050 """
5151 In a protected endpoint, this will return the identity of the JWT that is
5252 accessing the endpoint. If no JWT is present due to
53- `jwt_required(optional=True)`, `None` is returned.
53+ `` jwt_required(optional=True)`` , `` None` ` is returned.
5454
5555 :return:
5656 The identity of the JWT in the current request
@@ -67,7 +67,7 @@ def get_current_user():
6767 is configured. If the user loader callback is not being used, this will
6868 raise an error.
6969
70- If no JWT is present due to `jwt_required(optional=True)`, `None` is returned.
70+ If no JWT is present due to `` jwt_required(optional=True)`` , `` None` ` is returned.
7171
7272 :return:
7373 The current user object for the JWT in the current request
@@ -97,7 +97,7 @@ def decode_token(encoded_token, csrf_value=None, allow_expired=False):
9797 Expected CSRF double submit value (optional).
9898
9999 :param allow_expired:
100- If `True`, do not raise an error if the JWT is expired. Defaults to `False`
100+ If `` True`` , do not raise an error if the JWT is expired. Defaults to `` False` `
101101
102102 :return:
103103 Dictionary containing the payload of the JWT decoded JWT.
@@ -124,15 +124,15 @@ def create_access_token(
124124
125125 :param fresh:
126126 If this token should be marked as fresh, and can thus access endpoints
127- protected with `@jwt_required(fresh=True)`. Defaults to `False`.
127+ protected with `` @jwt_required(fresh=True)`` . Defaults to `` False` `.
128128
129- This value can also be a `datetime.timedelta`, which indicate
129+ This value can also be a `` datetime.timedelta` `, which indicate
130130 how long this token will be considered fresh.
131131
132132 :param expires_delta:
133- A `datetime.timedelta` for how long this token should last before it
133+ A `` datetime.timedelta` ` for how long this token should last before it
134134 expires. Set to False to disable expiration. If this is None, it will use
135- the ' JWT_ACCESS_TOKEN_EXPIRES` config value (see :ref:`Configuration Options`)
135+ the `` JWT_ACCESS_TOKEN_EXPIRES` ` config value (see :ref:`Configuration Options`)
136136
137137 :param additional_claims:
138138 Optional. A hash of claims to include in the access token. These claims are
@@ -173,9 +173,9 @@ def create_refresh_token(
173173 serializable format.
174174
175175 :param expires_delta:
176- A `datetime.timedelta` for how long this token should last before it expires.
176+ A `` datetime.timedelta` ` for how long this token should last before it expires.
177177 Set to False to disable expiration. If this is None, it will use the
178- ' JWT_REFRESH_TOKEN_EXPIRES` config value (see :ref:`Configuration Options`)
178+ `` JWT_REFRESH_TOKEN_EXPIRES` ` config value (see :ref:`Configuration Options`)
179179
180180 :param additional_claims:
181181 Optional. A hash of claims to include in the refresh token. These claims are
@@ -246,7 +246,7 @@ def get_csrf_token(encoded_token):
246246def set_access_cookies (response , encoded_access_token , max_age = None ):
247247 """
248248 Modifiy a Flask Response to set a cookie containing the access JWT.
249- Also sets the corresponding CSRF cookies if `JWT_CSRF_IN_COOKIES` is `True`
249+ Also sets the corresponding CSRF cookies if `` JWT_CSRF_IN_COOKIES`` is `` True` `
250250 (see :ref:`Configuration Options`)
251251
252252 :param response:
@@ -257,8 +257,8 @@ def set_access_cookies(response, encoded_access_token, max_age=None):
257257
258258 :param max_age:
259259 The max age of the cookie. If this is None, it will use the
260- `JWT_SESSION_COOKIE` option (see :ref:`Configuration Options`). Otherwise,
261- it will use this as the cookies `max-age` and the JWT_SESSION_COOKIE option
260+ `` JWT_SESSION_COOKIE` ` option (see :ref:`Configuration Options`). Otherwise,
261+ it will use this as the cookies `` max-age` ` and the JWT_SESSION_COOKIE option
262262 will be ignored. Values should be the number of seconds (as an integer).
263263 """
264264 response .set_cookie (
@@ -288,7 +288,7 @@ def set_access_cookies(response, encoded_access_token, max_age=None):
288288def set_refresh_cookies (response , encoded_refresh_token , max_age = None ):
289289 """
290290 Modifiy a Flask Response to set a cookie containing the refresh JWT.
291- Also sets the corresponding CSRF cookies if `JWT_CSRF_IN_COOKIES` is `True`
291+ Also sets the corresponding CSRF cookies if `` JWT_CSRF_IN_COOKIES`` is `` True` `
292292 (see :ref:`Configuration Options`)
293293
294294 :param response:
@@ -299,8 +299,8 @@ def set_refresh_cookies(response, encoded_refresh_token, max_age=None):
299299
300300 :param max_age:
301301 The max age of the cookie. If this is None, it will use the
302- `JWT_SESSION_COOKIE` option (see :ref:`Configuration Options`). Otherwise,
303- it will use this as the cookies `max-age` and the JWT_SESSION_COOKIE option
302+ `` JWT_SESSION_COOKIE` ` option (see :ref:`Configuration Options`). Otherwise,
303+ it will use this as the cookies `` max-age` ` and the JWT_SESSION_COOKIE option
304304 will be ignored. Values should be the number of seconds (as an integer).
305305 """
306306 response .set_cookie (
0 commit comments