@@ -62,12 +62,12 @@ func ForgotPasswordResolver(ctx context.Context, params model.ForgotPasswordInpu
6262 log .Debug ("Failed to generate nonce: " , err )
6363 return res , err
6464 }
65- redirectURL := parsers .GetAppURL (gc )
65+ redirectURI := parsers .GetAppURL (gc )
6666 if strings .TrimSpace (refs .StringValue (params .RedirectURI )) != "" {
67- redirectURL = refs .StringValue (params .RedirectURI )
67+ redirectURI = refs .StringValue (params .RedirectURI )
6868 }
6969
70- verificationToken , err := token .CreateVerificationToken (params .Email , constants .VerificationTypeForgotPassword , hostname , nonceHash , redirectURL )
70+ verificationToken , err := token .CreateVerificationToken (params .Email , constants .VerificationTypeForgotPassword , hostname , nonceHash , redirectURI )
7171 if err != nil {
7272 log .Debug ("Failed to create verification token" , err )
7373 return res , err
@@ -78,7 +78,7 @@ func ForgotPasswordResolver(ctx context.Context, params model.ForgotPasswordInpu
7878 ExpiresAt : time .Now ().Add (time .Minute * 30 ).Unix (),
7979 Email : params .Email ,
8080 Nonce : nonceHash ,
81- RedirectURI : redirectURL ,
81+ RedirectURI : redirectURI ,
8282 })
8383 if err != nil {
8484 log .Debug ("Failed to add verification request" , err )
@@ -89,7 +89,7 @@ func ForgotPasswordResolver(ctx context.Context, params model.ForgotPasswordInpu
8989 go email .SendEmail ([]string {params .Email }, constants .VerificationTypeForgotPassword , map [string ]interface {}{
9090 "user" : user .ToMap (),
9191 "organization" : utils .GetOrganization (),
92- "verification_url" : utils .GetForgotPasswordURL (verificationToken , hostname ),
92+ "verification_url" : utils .GetForgotPasswordURL (verificationToken , hostname , redirectURI ),
9393 })
9494
9595 res = & model.Response {
0 commit comments