-
-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: Remove username from verification emails #8488
base: alpha
Are you sure you want to change the base?
Conversation
I will reformat the title to use the proper commit message syntax. |
Thanks for opening this pull request! |
How should this handle expired tokens? With the old implementation the I'm also wondering if removing the |
Codecov ReportPatch coverage:
Additional details and impacted files@@ Coverage Diff @@
## alpha #8488 +/- ##
==========================================
- Coverage 94.37% 94.33% -0.04%
==========================================
Files 185 183 -2
Lines 14761 14501 -260
==========================================
- Hits 13930 13680 -250
+ Misses 831 821 -10
☔ View full report in Codecov by Sentry. |
What is the purpose of token expiration for email verification? If an expired token leads to a website where one can request a new token (sent via verification email) without login, the expiration seems useless. Is there any scenario in which expiration makes sense? Maybe the existing tests related to token expiration give clues about the intentions of expiration?
The difference of brute forcing two fields (email + token) vs one field (token) is just the amount of possible combinations. If we make the token a longer string, the difficulty should be the same. What happens in the following scenario:
|
Signed-off-by: Daniel <daniel-blyth@live.com.au>
This PR:
This all feels like pretty breaking changes to me, which I think we would have to phase in @mtrezza thoughts? |
Did you find out any hinds regarding:
Regarding breaking change:
|
Pull Request
Issue
Currently, Parse Server exposes
username
via verification email urls. All that should be needed to perform a reset request is a valid tokenCloses: #7137
Approach
Tasks