![Oracle Drags Its Feet in the JavaScript Trademark Dispute](https://cdn.sanity.io/images/cgdhsj6q/production/919c3b22c24f93884c548d60cbb338e819ff2435-1024x1024.webp?w=400&fit=max&auto=format)
Security News
Oracle Drags Its Feet in the JavaScript Trademark Dispute
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.
parse-server-mailgun
Advanced tools
Allows your Parse Server app to send template-based password reset and email verification through Mailgun
Allows your Parse Server app to send template-based password reset and email verification through Mailgun. Just add your template files (plain text and html) to the email adapter's configuration.
npm install --save parse-server-mailgun
As is the case with the default Mailgun adapter that comes with the Parse Server, you need to set a fromAddres, and the domain and apiKey provided by Mailgun. In addition, you now need to configure the templates you wish to use with the password reset and email verification emails:
const resolve = require('path').resolve;
// Note that the paths to the templates are absolute.
var server = ParseServer({
...otherOptions,
// Enable email verification
verifyUserEmails: true,
emailAdapter: {
module: 'parse-server-mailgun',
options: {
// The address that your emails come from
fromAddress: 'parse@example.com',
// Your domain from mailgun.com
domain: 'example.com',
// Your API key from mailgun.com
apiKey: 'key-mykey',
// The template section
templates: {
passwordResetEmail: {
subject: 'Reset your password',
pathPlainText: resolve(__dirname, 'path/to/templates/password_reset_email.txt'),
pathHtml: resolve(__dirname, 'path/to/templates/password_reset_email.html'),
callback: (user) => { return { firstName: user.get('firstName') }}
// Will be rendered as the value for the {{firstName}} variable in your template
},
verificationEmail: {
subject: 'Confirm your account',
pathPlainText: resolve(__dirname, 'path/to/templates/verification_email.txt'),
pathHtml: resolve(__dirname, 'path/to/templates/verification_email.html'),
callback: (user) => { return { firstName: user.get('firstName') }}
// Will be rendered as the value for the {{firstName}} variable in your template
}
}
}
}
});
You must provide at least a plain-text version for both the reset and verification emails. The html versions are optional.
The dependency on cheerio is removed. From now on, use Mustache-style variable syntax, e.g. {{variable}}
, in your templates.
If you're upgrading from 1.0.2, be sure to update your templates with the new syntax style!
As shown in the sample configuration above, you can now add a callback in order to introduce some custom variables to the content. The relevant Parse.User object is conveniently passed as an argument. The callback should always return a plain object where the property names match their template counterparts.
In the test directory, there are a few examples to get you started. By default, you can use the following variables in your template files:
{{link}}
- the reset or verification link provided by the Parse Server{{appName}}
- as is defined in your Parse Server configuration object{{username}}
- the Parse.User object's username property{{email}}
- the Parse.User object's email propertyAdditional variables can be rendered by adding a callback
FAQs
Mailgun adapter for Parse Server apps
The npm package parse-server-mailgun receives a total of 530 weekly downloads. As such, parse-server-mailgun popularity was classified as not popular.
We found that parse-server-mailgun demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.
Security News
The Linux Foundation is warning open source developers that compliance with global sanctions is mandatory, highlighting legal risks and restrictions on contributions.
Security News
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.