Skip to content

Conversation

@hhvrc
Copy link
Contributor

@hhvrc hhvrc commented Sep 15, 2025

No description provided.

@changeset-bot
Copy link

changeset-bot bot commented Sep 15, 2025

⚠️ No Changeset found

Latest commit: e98218a

Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.

This PR includes no changesets

When changesets are added to this PR, you'll see the packages that this PR includes changesets for and the associated semver types

Click here to learn what changesets are, and how to add one.

Click here if you're a maintainer who wants to add a changeset to this PR

@hhvrc hhvrc merged commit 4e78562 into develop Sep 15, 2025
3 checks passed
@hhvrc hhvrc deleted the feature/oauth-support branch September 15, 2025 21:25
Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codex Review: Here are some suggestions.

Reply with @codex fix comments to fix any unresolved comments.

About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you open a pull request for review, mark a draft as ready, or comment "@codex review". If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex fix this CI failure" or "@codex address that feedback".

Comment on lines +20 to +37
let password = $state('');
let canSubmit = $derived(
usernameValid && emailValid
);
async function handleSubmission(e: SubmitEvent) {
e.preventDefault();
if (!username || !email) {
return;
}
try {
const account = await oauthApi.oAuthOAuthSignupFinalize(page.params.provider!, {
username,
email,
password,

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[P1] Avoid submitting empty passwords during OAuth sign up

The signup form does not expose any password input, yet handleSubmission unconditionally forwards password (initialized to '') to oauthApi.oAuthOAuthSignupFinalize. The API model describes password as optional and server-side validation is likely to reject an empty string as failing minimum length requirements. Because the user never has a chance to set password, every submission will carry an invalid value and the OAuth create flow cannot succeed. Send null when the field is intentionally omitted or add a password field so the request can satisfy backend validation.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants