Skip to content

Commit e1e5c55

Browse files
committed
Updated changelog
1 parent 1bdc665 commit e1e5c55

File tree

1 file changed

+19
-17
lines changed

1 file changed

+19
-17
lines changed

CHANGELOG.md

Lines changed: 19 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
88

99
## [unreleased]
1010

11+
- Return `raw_user_info_from_provider` in github provider [#474]
12+
1113
## [0.27.0] - 2024-12-30
1214

1315
- Added OAuth2Provider recipe
@@ -277,7 +279,7 @@ async def change_email(req: ChangeEmailBody, session: SessionContainer = Depends
277279
# Update the email
278280
await update_email_or_password(
279281
session.get_recipe_user_id(),
280-
email,
282+
email,
281283
)
282284

283285
# ...
@@ -360,7 +362,7 @@ from supertokens_python.types import RecipeUserId
360362

361363
def functions_override(original_implementation: RecipeInterface):
362364
o_create_new_session = original_implementation.create_new_session
363-
365+
364366
async def n_create_new_session(
365367
user_id: str,
366368
recipe_user_id: RecipeUserId,
@@ -377,7 +379,7 @@ def functions_override(original_implementation: RecipeInterface):
377379
return await o_create_new_session(user_id, recipe_user_id, access_token_payload, session_data_in_database, disable_anti_csrf, tenant_id, user_context)
378380

379381
original_implementation.create_new_session = n_create_new_session
380-
382+
381383
return original_implementation
382384

383385
session.init(override=session.InputOverrideConfig(functions=functions_override))
@@ -395,7 +397,7 @@ from supertokens_python.types import RecipeUserId
395397

396398
def functions_override(original_implementation: RecipeInterface):
397399
o_create_new_session = original_implementation.create_new_session
398-
400+
399401
async def n_create_new_session(
400402
user_id: str,
401403
recipe_user_id: RecipeUserId,
@@ -412,7 +414,7 @@ def functions_override(original_implementation: RecipeInterface):
412414
return await o_create_new_session(user_id, recipe_user_id, access_token_payload, session_data_in_database, disable_anti_csrf, tenant_id, user_context)
413415

414416
original_implementation.create_new_session = n_create_new_session
415-
417+
416418
return original_implementation
417419

418420
session.init(override=session.InputOverrideConfig(functions=functions_override))
@@ -632,7 +634,7 @@ thirdparty.init(
632634
third_party_id="google",
633635
# rest of the config
634636
),
635-
637+
636638
# Add the following line to make this provider available in non-public tenants by default
637639
include_in_non_public_tenants_by_default=True
638640
),
@@ -641,7 +643,7 @@ thirdparty.init(
641643
third_party_id="github",
642644
# rest of the config
643645
),
644-
646+
645647
# Add the following line to make this provider available in non-public tenants by default
646648
include_in_non_public_tenants_by_default=True
647649
),
@@ -733,7 +735,7 @@ for tenant in tenants_res.tenants:
733735

734736
- The way to get user information has changed:
735737
- If you are using `get_users_by_email` from `thirdpartyemailpassword` recipe:
736-
738+
737739
Before:
738740
```python
739741
from supertokens_python.recipe.thirdpartyemailpassword.syncio import get_users_by_email
@@ -745,20 +747,20 @@ for tenant in tenants_res.tenants:
745747
```python
746748
from supertokens_python.recipe.thirdparty.syncio import get_users_by_email as get_users_by_email_third_party
747749
from supertokens_python.recipe.emailpassword.syncio import get_user_by_email as get_user_by_email_emailpassword
748-
750+
749751
third_party_user_info = get_users_by_email_third_party("public", "[email protected]")
750752

751753
email_password_user_info = get_user_by_email_emailpassword("public", "[email protected]")
752754

753755
if email_password_user_info is not None:
754756
print(email_password_user_info)
755-
757+
756758
if len(third_party_user_info) > 0:
757759
print(third_party_user_info)
758760
```
759761

760762
- If you are using `get_user_id` from `thirdpartyemailpassword` recipe:
761-
763+
762764
Before:
763765
```python
764766
from supertokens_python.recipe.thirdpartyemailpassword.syncio import get_user_by_id
@@ -783,9 +785,9 @@ for tenant in tenants_res.tenants:
783785
else:
784786
print(thirdparty_user)
785787
```
786-
788+
787789
- If you are using `get_users_by_email` from `thirdpartypasswordless` recipe:
788-
790+
789791
Before:
790792
```python
791793
from supertokens_python.recipe.thirdpartypasswordless.syncio import get_users_by_email
@@ -797,20 +799,20 @@ for tenant in tenants_res.tenants:
797799
```python
798800
from supertokens_python.recipe.thirdparty.syncio import get_users_by_email as get_users_by_email_third_party
799801
from supertokens_python.recipe.passwordless.syncio import get_user_by_email as get_user_by_email_passwordless
800-
802+
801803
third_party_user_info = get_users_by_email_third_party("public", "[email protected]")
802804

803805
passwordless_user_info = get_user_by_email_passwordless("public", "[email protected]")
804806

805807
if passwordless_user_info is not None:
806808
print(passwordless_user_info)
807-
809+
808810
if len(third_party_user_info) > 0:
809811
print(third_party_user_info)
810812
```
811813

812814
- If you are using `get_user_id` from `thirdpartypasswordless` recipe:
813-
815+
814816
Before:
815817
```python
816818
from supertokens_python.recipe.thirdpartypasswordless.syncio import get_user_by_id
@@ -1022,7 +1024,7 @@ With this update, verify_session will return a 401 error if it detects multiple
10221024
)
10231025
```
10241026

1025-
- In the session recipe, if there is an `UNAUTHORISED` or `TOKEN_THEFT_DETECTED` error, the session tokens are cleared in the response regardless of if you have provided your own `error_handlers` in `session.init`
1027+
- In the session recipe, if there is an `UNAUTHORISED` or `TOKEN_THEFT_DETECTED` error, the session tokens are cleared in the response regardless of if you have provided your own `error_handlers` in `session.init`
10261028

10271029
## [0.17.0] - 2023-11-14
10281030
- Fixes `create_reset_password_link` in the emailpassword recipe wherein we passed the `rid` instead of the token in the link

0 commit comments

Comments
 (0)