File tree Expand file tree Collapse file tree 4 files changed +8
-2
lines changed Expand file tree Collapse file tree 4 files changed +8
-2
lines changed Original file line number Diff line number Diff line change @@ -277,7 +277,7 @@ function onAuthError(error) {
277
277
// Handle second factor sign-in.
278
278
handleMultiFactorSignIn ( getMultiFactorResolver ( auth , error ) ) ;
279
279
} else {
280
- alertError ( 'Error: ' + error . code ) ;
280
+ alertError ( 'Error: ' + error . code + 'user email : ' + error . customData . email ) ;
281
281
}
282
282
}
283
283
Original file line number Diff line number Diff line change @@ -189,6 +189,7 @@ export const SERVER_ERROR_MAP: Partial<ServerErrorMap<ServerError>> = {
189
189
190
190
// User actions (sign-up or deletion) disabled errors.
191
191
[ ServerError . ADMIN_ONLY_OPERATION ] : AuthErrorCode . ADMIN_ONLY_OPERATION ,
192
+ [ ServerError . USER_DISABLED ] : AuthErrorCode . USER_DISABLED ,
192
193
193
194
// Multi factor related errors.
194
195
[ ServerError . INVALID_MFA_PENDING_CREDENTIAL ] :
Original file line number Diff line number Diff line change @@ -145,7 +145,6 @@ export async function _performFetchWithErrorHandling<V>(
145
145
if ( 'needConfirmation' in json ) {
146
146
throw _makeTaggedError ( auth , AuthErrorCode . NEED_CONFIRMATION , json ) ;
147
147
}
148
-
149
148
if ( response . ok && ! ( 'errorMessage' in json ) ) {
150
149
return json ;
151
150
} else {
@@ -159,6 +158,8 @@ export async function _performFetchWithErrorHandling<V>(
159
158
) ;
160
159
} else if ( serverErrorCode === ServerError . EMAIL_EXISTS ) {
161
160
throw _makeTaggedError ( auth , AuthErrorCode . EMAIL_EXISTS , json ) ;
161
+ } else if ( serverErrorCode === ServerError . USER_DISABLED ) {
162
+ throw _makeTaggedError ( auth , AuthErrorCode . USER_DISABLED , json ) ;
162
163
}
163
164
const authError =
164
165
errorMap [ serverErrorCode as ServerError ] ||
Original file line number Diff line number Diff line change @@ -433,6 +433,10 @@ export interface AuthErrorParams extends GenericAuthErrorParams {
433
433
appName : AppName ;
434
434
_serverResponse : IdTokenMfaResponse ;
435
435
} ;
436
+ [ AuthErrorCode . USER_DISABLED ] : {
437
+ appName : AppName ;
438
+ email : string ;
439
+ } ;
436
440
[ AuthErrorCode . INVALID_CORDOVA_CONFIGURATION ] : {
437
441
appName : AppName ;
438
442
missingPlugin ?: string ;
You can’t perform that action at this time.
0 commit comments