Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Forgot and Reset Password Implemented #220

Merged
merged 3 commits into from
Jun 2, 2024

Conversation

niteshtiwari52
Copy link
Contributor

@adil-techcode First of all, I am so sorry for commit and pushing the code late.

Issue No : #34

I have implemented the forgot and reset password using the OTP Verification.

Setup or Environment Variable required:
PORT : optional and anything
DATABASE_URL : database connection url
JWT_SECRET : A secret key to generate token securely and this can be anything of your choice.
CLIENT_URL: Our frontend base url where our frontend application hosted.

SMTP_SERVICES: Your mailing service (e.g., "gmail").
SMTP_MAIL: Your email address from which the emails will be sent.
SMTP_PASSWORD: The application-specific password for your email account.
SMTP_HOST: The SMTP host address for your email service (e.g., "smtp.gmail.com").
SMTP_PORT: The port number for your SMTP service (e.g., 465 for Gmail).

I am also attaching the postman documentation for sample data.
**Postman Documentation: **https://documenter.getpostman.com/view/23029976/2sA3QqhYdF

If Any further disscussion or help required, please feel free to contact.

Copy link

vercel bot commented May 26, 2024

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
shopy-frontend ✅ Ready (Inspect) Visit Preview 💬 Add feedback May 30, 2024 11:39am

Copy link

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great job, @niteshtiwari52! 🎉 Thank you for submitting your pull request. Your contribution is valuable and we appreciate your efforts to improve our project.

We will promptly review your changes and offer feedback. Keep up the excellent work! Kindly remember to check our contributing guidelines

Copy link

gitguardian bot commented May 26, 2024

⚠️ GitGuardian has uncovered 2 secrets following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secrets in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
- Generic Password efe82e3 server/.env View secret
- Generic Password 4dd1edc server/.env View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secrets safely. Learn here the best practices.
  3. Revoke and rotate these secrets.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

@mohitparmar1
Copy link
Owner

resolve conflicts!

@niteshtiwari52
Copy link
Contributor Author

conflicts has been resolved now. you can close now this issues if every thing is working fine.
If any help or any disscussion needed for this pull request, I will be avaialable

@mohitparmar1 mohitparmar1 merged commit 37c1a2b into mohitparmar1:main Jun 2, 2024
1 of 2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants