Implemented All Requests For Voice Messaging Endpoints#223
Implemented All Requests For Voice Messaging Endpoints#223KiPageFault wants to merge 16 commits intomainfrom
Conversation
Created File Checking And Loading CSV's Via Pandas In Utility Added Additional File Exceptions Polished Voice Messaging Endpoints
Fixed None Pythonic Evaluation To Satisfy Lint Error
Removed Log Formatting When Specifying No Raw Type To Satisfy Lint Error
Removed Invalid Log Formatting To Satisfy Lint Error
|
Added All Necessary Documentation |
src/odins_spear/scripter.py
Outdated
| self, | ||
| service_provider_id: str, | ||
| group_id: str, | ||
| service_pack_id: str = None |
There was a problem hiding this comment.
Although 14 are good at service packs for specific users we don't know if other companies are. Can you remove this param and update the method accordingly. I would change this to a list of users and set to None, if the user passes us the list of users we will do for those only if not we will apply to all. - What do you think?
src/odins_spear/scripter.py
Outdated
| self, | ||
| service_provider_id: str, | ||
| group_id: str, | ||
| new_password: str |
There was a problem hiding this comment.
Same here as above should we add a list of users? Additionally we could have new_password as optional and if they do not specify one we could use the api.generate_password to get one/ a unique for each. Final thought we would need to pass these details back to the user.
There was a problem hiding this comment.
The optional password is a great idea! However for the list of users. The alteration of vm_portal_bulk_password_set in the powered by odins spear docs will allow users to perform this action themselves
| ) | ||
|
|
||
| logger.info("Successfully Set Group User Portal Passcodes") | ||
|
|
There was a problem hiding this comment.
Same as above is there anything we would return to the user?
There was a problem hiding this comment.
I dont believe there is anything to tangibly return bar a list of affected users. Due to the scripts nature it is impossible to return the users with their new password as it is it obfuscated in the request
Jordan-Prescott
left a comment
There was a problem hiding this comment.
Still some parts to iron these out
|
|
||
| def main( | ||
| api, service_provider_id: str, group_id: str, users: list, password_type: str | ||
| api, service_provider_id: str, group_id: str, users: list, password_type: str, static_password: str |
There was a problem hiding this comment.
I like this static password param nice work - have you updated docs to reflect this both in codebase and the docs online?
| @@ -0,0 +1,54 @@ | |||
| def main(api, service_provider_id: str, group_id: str, service_pack_id: str = None): | |||
There was a problem hiding this comment.
Commented on this above, the service pack id here I think we should remove.
…ed Service Packs From VM Auto Login
Jordan-Prescott
left a comment
There was a problem hiding this comment.
Few bits but there are a lot of changes here so it may take us a couple of times to get it there.
There was a problem hiding this comment.
This needs removing - be careful about what you commit and push.
What's useful is having another environment on your computer where you have the latest v of OS for these kind of things.
| @@ -0,0 +1,574 @@ | |||
| from .base_endpoint import BaseEndpoint | |||
|
|
|||
| class VoiceMessaging( | |||
There was a problem hiding this comment.
is there no POST methods in this endpoint?
| group_id: str, | ||
| users: list, | ||
| password_type: str, | ||
| static_password: Optional[str] = None |
There was a problem hiding this comment.
Have you tested this with each password type? This script updates 3 types of passwords
|
|
||
| def vm_auto_login( | ||
| self, | ||
| service_provider_id: str, |
There was a problem hiding this comment.
Can we add a param here to specify users and if no users specified we auto login all?
Checklist
Reviewer Only
Code Quality
Functionality
Testing
Documentation
Dependencies
Performance
Security
Merge Preparations