Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🔑 fix(AuthService): properly handle reading and deletion of password reset token #3697

Merged
merged 1 commit into from
Aug 19, 2024

Conversation

berry-13
Copy link
Collaborator

@berry-13 berry-13 commented Aug 19, 2024

Summary

fixed a wrong read and delete function in the reset password

https://discord.com/channels/1086345563026489514/1105648303909126144/1275185080276619275

caused by #3012

Change Type

  • Bug fix (non-breaking change which fixes an issue)

Checklist

  • My code adheres to this project's style guidelines
  • I have performed a self-review of my own code
  • I have commented in any complex areas of my code
  • I have made pertinent documentation changes
  • My changes do not introduce new warnings
  • I have written tests demonstrating that my changes are effective or that my feature works
  • Local unit tests pass with my changes
  • Any changes dependent on mine have been merged and published in downstream modules.
  • A pull request for updating the documentation has been submitted.

@berry-13 berry-13 changed the title 🔑 fix(AuthService): password reset token not read and deleted correctly 🔑 fix(AuthService): properly handle reading and deletion of password reset token Aug 19, 2024
@danny-avila danny-avila merged commit d4c0f72 into main Aug 19, 2024
2 checks passed
@danny-avila danny-avila deleted the bug-password-reset branch August 19, 2024 21:55
kenshinsamue pushed a commit to intelequia/LibreChat that referenced this pull request Sep 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants