Skip to content

Commit

Permalink
Merge pull request #3 from ankiitsinghh07/master
Browse files Browse the repository at this point in the history
Version 11.0.0
  • Loading branch information
akshayLoginradius authored Aug 11, 2020
2 parents d5510fd + 0390bde commit b9a6ea0
Show file tree
Hide file tree
Showing 24 changed files with 398 additions and 206 deletions.
22 changes: 20 additions & 2 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,12 +1,30 @@
# LoginRadius Python SDK Change Log

# Version 11.0.0
Released on **August 11,2020**
## Enhancements:
- Added a parameter isWeb in "RefreshAccessToken" API.
- Added a parameter SocialAppName in "getAccessTokenByFacebookAccessToken, getAccessTokenByTwitterAccessToken,
getAccessTokenByGoogleAccessToken, getAccessTokenByLinkedinAccessToken, getAccessTokenByAppleIdCode,
getAccessTokenByGoogleAuthCode" Native Social login APIs.

## Added new multiple APIs for better user experience:
- Added linkSocialIdentites(POST) API.
- Added linkSocialIdentitiesByPing(POST) API.
- Added getAccessTokenByAppleIdCode API.
- Added getAccessTokenByWeChatCode API.

## Removed APIs:
- linkSocialIdentity API(PUT)
- getSocialIdentity API(GET)

# Version 10.0.1
Release on **Oct 24,2019**
Released on **Oct 24,2019**
## Enhancements
- Fixed the pip installation issue

# Version 10.0.0
Release on **September 30,2019**
Released on **September 30,2019**

## Enhancements
This full version release includes major breaking changes with several improvements and optimizations :
Expand Down
6 changes: 3 additions & 3 deletions Demo/LoginRadius/api/account/account_api.py
Original file line number Diff line number Diff line change
Expand Up @@ -477,10 +477,10 @@ def remove_email(self, email, uid, fields=''):
return self._lr_object.execute("DELETE", resource_path, query_parameters, body_parameters)

def refresh_access_token_by_refresh_token(self, refresh__token):
"""This API is used to refresh an access_token via it's associated refresh_token.
"""This API is used to refresh an access token via it's associated refresh token.
Args:
refresh__token: LoginRadius refresh_token
refresh__token: LoginRadius refresh token
Returns:
Response containing Definition of Complete Token data
Expand All @@ -502,7 +502,7 @@ def revoke_refresh_token(self, refresh__token):
"""The Revoke Refresh Access Token API is used to revoke a refresh token or the Provider Access Token, revoking an existing refresh token will invalidate the refresh token but the associated access token will work until the expiry.
Args:
refresh__token: LoginRadius refresh_token
refresh__token: LoginRadius refresh token
Returns:
Response containing Definition of Delete Request
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -102,7 +102,7 @@ def get_registration_data(self, type, limit=None, parent_id=None,
return self._lr_object.execute("GET", resource_path, query_parameters, None)

def add_registration_data(self, registration_data_create_model_list):
"""This API allows you to fill data into a dropdown list which you have created for user Registeration. For more details on how to use this API please see our Custom Registration Data Overview
"""This API allows you to fill data into a dropdown list which you have created for user Registration. For more details on how to use this API please see our Custom Registration Data Overview
Args:
registration_data_create_model_list: Model Class containing Definition of List of Registration Data
Expand Down
12 changes: 6 additions & 6 deletions Demo/LoginRadius/api/advanced/multifactorauthentication_api.py
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ def __init__(self, lr_object):
self._lr_object = lr_object

def mfa_configure_by_access_token(self, access_token, sms_template2_f_a=None):
"""This API is used to configure the Multi-factor authentication after login by using the access_token when MFA is set as optional on the LoginRadius site.
"""This API is used to configure the Multi-factor authentication after login by using the access token when MFA is set as optional on the LoginRadius site.
Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand Down Expand Up @@ -126,7 +126,7 @@ def mfa_update_phone_number_by_token(self, access_token, phone_no2_f_a, sms_temp
return self._lr_object.execute("PUT", resource_path, query_parameters, body_parameters)

def mfa_reset_google_auth_by_token(self, access_token, googleauthenticator):
"""This API Resets the Google Authenticator configurations on a given account via the access_token
"""This API Resets the Google Authenticator configurations on a given account via the access token
Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand All @@ -151,7 +151,7 @@ def mfa_reset_google_auth_by_token(self, access_token, googleauthenticator):
return self._lr_object.execute("DELETE", resource_path, query_parameters, body_parameters)

def mfa_reset_sms_auth_by_token(self, access_token, otpauthenticator):
"""This API resets the SMS Authenticator configurations on a given account via the access_token.
"""This API resets the SMS Authenticator configurations on a given account via the access token.
Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand All @@ -176,7 +176,7 @@ def mfa_reset_sms_auth_by_token(self, access_token, otpauthenticator):
return self._lr_object.execute("DELETE", resource_path, query_parameters, body_parameters)

def mfa_backup_code_by_access_token(self, access_token):
"""This API is used to get a set of backup codes via access_token to allow the user login on a site that has Multi-factor Authentication enabled in the event that the user does not have a secondary factor available. We generate 10 codes, each code can only be consumed once. If any user attempts to go over the number of invalid login attempts configured in the Dashboard then the account gets blocked automatically
"""This API is used to get a set of backup codes via access token to allow the user login on a site that has Multi-factor Authentication enabled in the event that the user does not have a secondary factor available. We generate 10 codes, each code can only be consumed once. If any user attempts to go over the number of invalid login attempts configured in the Dashboard then the account gets blocked automatically
Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand All @@ -197,7 +197,7 @@ def mfa_backup_code_by_access_token(self, access_token):
return self._lr_object.execute("GET", resource_path, query_parameters, None)

def mfa_reset_backup_code_by_access_token(self, access_token):
"""API is used to reset the backup codes on a given account via the access_token. This API call will generate 10 new codes, each code can only be consumed once
"""API is used to reset the backup codes on a given account via the access token. This API call will generate 10 new codes, each code can only be consumed once
Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand Down Expand Up @@ -428,7 +428,7 @@ def mfa_validate_google_auth_code(self, google_authenticator_code, second_factor
return self._lr_object.execute("PUT", resource_path, query_parameters, body_parameters)

def mfa_validate_backup_code(self, multi_factor_auth_model_by_backup_code, second_factor_authentication_token, fields=''):
"""This API is used to validate the backup code provided by the user and if valid, we return an access_token allowing the user to login incases where Multi-factor authentication (MFA) is enabled and the secondary factor is unavailable. When a user initially downloads the Backup codes, We generate 10 codes, each code can only be consumed once. if any user attempts to go over the number of invalid login attempts configured in the Dashboard then the account gets blocked automatically
"""This API is used to validate the backup code provided by the user and if valid, we return an access token allowing the user to login incases where Multi-factor authentication (MFA) is enabled and the secondary factor is unavailable. When a user initially downloads the Backup codes, We generate 10 codes, each code can only be consumed once. if any user attempts to go over the number of invalid login attempts configured in the Dashboard then the account gets blocked automatically
Args:
multi_factor_auth_model_by_backup_code: Model Class containing Definition of payload for MultiFactorAuth By BackupCode API
Expand Down
4 changes: 2 additions & 2 deletions Demo/LoginRadius/api/advanced/reauthentication_api.py
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ def __init__(self, lr_object):
self._lr_object = lr_object

def mfa_re_authenticate(self, access_token, sms_template2_f_a=None):
"""This API is used to trigger the Multi-Factor Autentication workflow for the provided access_token
"""This API is used to trigger the Multi-Factor Autentication workflow for the provided access token
Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand Down Expand Up @@ -61,7 +61,7 @@ def mfa_re_authenticate_by_otp(self, access_token, reauth_by_otp_model):
return self._lr_object.execute("PUT", resource_path, query_parameters, reauth_by_otp_model)

def mfa_re_authenticate_by_backup_code(self, access_token, reauth_by_backup_code_model):
"""This API is used to re-authenticate by set of backup codes via access_token on the site that has Multi-factor authentication enabled in re-authentication for the user that does not have the device
"""This API is used to re-authenticate by set of backup codes via access token on the site that has Multi-factor authentication enabled in re-authentication for the user that does not have the device
Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand Down
Loading

0 comments on commit b9a6ea0

Please sign in to comment.