-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Forgot and Reset Password Implemented #220
Conversation
The latest updates on your projects. Learn more about Vercel for Git ↗︎
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great job, @niteshtiwari52! 🎉 Thank you for submitting your pull request. Your contribution is valuable and we appreciate your efforts to improve our project.
We will promptly review your changes and offer feedback. Keep up the excellent work! Kindly remember to check our contributing guidelines
|
GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
---|---|---|---|---|---|
- | Generic Password | efe82e3 | server/.env | View secret | |
- | Generic Password | 4dd1edc | server/.env | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secrets safely. Learn here the best practices.
- Revoke and rotate these secrets.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
resolve conflicts! |
conflicts has been resolved now. you can close now this issues if every thing is working fine. |
@adil-techcode First of all, I am so sorry for commit and pushing the code late.
Issue No : #34
I have implemented the forgot and reset password using the OTP Verification.
Setup or Environment Variable required:
PORT : optional and anything
DATABASE_URL : database connection url
JWT_SECRET : A secret key to generate token securely and this can be anything of your choice.
CLIENT_URL: Our frontend base url where our frontend application hosted.
SMTP_SERVICES: Your mailing service (e.g., "gmail").
SMTP_MAIL: Your email address from which the emails will be sent.
SMTP_PASSWORD: The application-specific password for your email account.
SMTP_HOST: The SMTP host address for your email service (e.g., "smtp.gmail.com").
SMTP_PORT: The port number for your SMTP service (e.g., 465 for Gmail).
I am also attaching the postman documentation for sample data.
**Postman Documentation: **https://documenter.getpostman.com/view/23029976/2sA3QqhYdF
If Any further disscussion or help required, please feel free to contact.