@firebase/auth 1.7.1 → 1.7.2-canary.14f9da66f
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/auth-public.d.ts +15 -9
- package/dist/auth.d.ts +15 -9
- package/dist/browser-cjs/{index-c3c97b2a.js → index-54229e16.js} +16 -10
- package/dist/browser-cjs/index-54229e16.js.map +1 -0
- package/dist/browser-cjs/index.js +1 -1
- package/dist/browser-cjs/internal.js +1 -1
- package/dist/browser-cjs/src/core/strategies/email.d.ts +5 -3
- package/dist/browser-cjs/src/core/strategies/email_and_password.d.ts +6 -4
- package/dist/browser-cjs/src/core/user/account_info.d.ts +3 -1
- package/dist/browser-cjs/src/model/public_types.d.ts +1 -1
- package/dist/cordova/index.js +2 -2
- package/dist/cordova/internal.js +2 -2
- package/dist/cordova/{popup_redirect-176dbc3d.js → popup_redirect-10e360b6.js} +16 -10
- package/dist/cordova/popup_redirect-10e360b6.js.map +1 -0
- package/dist/cordova/src/core/strategies/email.d.ts +5 -3
- package/dist/cordova/src/core/strategies/email_and_password.d.ts +6 -4
- package/dist/cordova/src/core/user/account_info.d.ts +3 -1
- package/dist/cordova/src/model/public_types.d.ts +1 -1
- package/dist/esm2017/{index-219c3cac.js → index-f3d1e287.js} +16 -10
- package/dist/esm2017/index-f3d1e287.js.map +1 -0
- package/dist/esm2017/index.js +1 -1
- package/dist/esm2017/internal.js +2 -2
- package/dist/esm2017/src/core/strategies/email.d.ts +5 -3
- package/dist/esm2017/src/core/strategies/email_and_password.d.ts +6 -4
- package/dist/esm2017/src/core/user/account_info.d.ts +3 -1
- package/dist/esm2017/src/model/public_types.d.ts +1 -1
- package/dist/esm5/{index-4db3aed5.js → index-09b24b61.js} +16 -10
- package/dist/esm5/index-09b24b61.js.map +1 -0
- package/dist/esm5/index.js +1 -1
- package/dist/esm5/internal.js +2 -2
- package/dist/esm5/src/core/strategies/email.d.ts +5 -3
- package/dist/esm5/src/core/strategies/email_and_password.d.ts +6 -4
- package/dist/esm5/src/core/user/account_info.d.ts +3 -1
- package/dist/esm5/src/model/public_types.d.ts +1 -1
- package/dist/index.webworker.esm5.js +15 -9
- package/dist/index.webworker.esm5.js.map +1 -1
- package/dist/node/index.js +1 -1
- package/dist/node/internal.js +1 -1
- package/dist/node/src/core/strategies/email.d.ts +5 -3
- package/dist/node/src/core/strategies/email_and_password.d.ts +6 -4
- package/dist/node/src/core/user/account_info.d.ts +3 -1
- package/dist/node/src/model/public_types.d.ts +1 -1
- package/dist/node/{totp-82f035ef.js → totp-163ef5be.js} +16 -10
- package/dist/node/{totp-82f035ef.js.map → totp-163ef5be.js.map} +1 -1
- package/dist/node-esm/index.js +1 -1
- package/dist/node-esm/internal.js +2 -2
- package/dist/node-esm/src/core/strategies/email.d.ts +5 -3
- package/dist/node-esm/src/core/strategies/email_and_password.d.ts +6 -4
- package/dist/node-esm/src/core/user/account_info.d.ts +3 -1
- package/dist/node-esm/src/model/public_types.d.ts +1 -1
- package/dist/node-esm/{totp-4f5b6c4c.js → totp-2ef89a62.js} +16 -10
- package/dist/node-esm/{totp-4f5b6c4c.js.map → totp-2ef89a62.js.map} +1 -1
- package/dist/rn/{index-815db531.js → index-c43f0a1f.js} +16 -10
- package/dist/rn/index-c43f0a1f.js.map +1 -0
- package/dist/rn/index.js +1 -1
- package/dist/rn/internal.js +1 -1
- package/dist/rn/src/core/strategies/email.d.ts +5 -3
- package/dist/rn/src/core/strategies/email_and_password.d.ts +6 -4
- package/dist/rn/src/core/user/account_info.d.ts +3 -1
- package/dist/rn/src/model/public_types.d.ts +1 -1
- package/dist/src/core/strategies/email.d.ts +5 -3
- package/dist/src/core/strategies/email_and_password.d.ts +6 -4
- package/dist/src/core/user/account_info.d.ts +3 -1
- package/dist/src/model/public_types.d.ts +1 -1
- package/dist/web-extension-cjs/index.js +1 -1
- package/dist/web-extension-cjs/internal.js +1 -1
- package/dist/web-extension-cjs/{register-0489fcc8.js → register-6acd3653.js} +16 -10
- package/dist/{web-extension-esm2017/register-0cfbfa94.js.map → web-extension-cjs/register-6acd3653.js.map} +1 -1
- package/dist/web-extension-cjs/src/core/strategies/email.d.ts +5 -3
- package/dist/web-extension-cjs/src/core/strategies/email_and_password.d.ts +6 -4
- package/dist/web-extension-cjs/src/core/user/account_info.d.ts +3 -1
- package/dist/web-extension-cjs/src/model/public_types.d.ts +1 -1
- package/dist/web-extension-esm2017/index.js +2 -2
- package/dist/web-extension-esm2017/internal.js +2 -2
- package/dist/web-extension-esm2017/package.json +1 -0
- package/dist/web-extension-esm2017/{register-0cfbfa94.js → register-666daa09.js} +16 -10
- package/dist/{web-extension-cjs/register-0489fcc8.js.map → web-extension-esm2017/register-666daa09.js.map} +1 -1
- package/dist/web-extension-esm2017/src/core/strategies/email.d.ts +5 -3
- package/dist/web-extension-esm2017/src/core/strategies/email_and_password.d.ts +6 -4
- package/dist/web-extension-esm2017/src/core/user/account_info.d.ts +3 -1
- package/dist/web-extension-esm2017/src/model/public_types.d.ts +1 -1
- package/package.json +6 -6
- package/dist/browser-cjs/index-c3c97b2a.js.map +0 -1
- package/dist/cordova/popup_redirect-176dbc3d.js.map +0 -1
- package/dist/esm2017/index-219c3cac.js.map +0 -1
- package/dist/esm5/index-4db3aed5.js.map +0 -1
- package/dist/rn/index-815db531.js.map +0 -1
|
@@ -17,8 +17,9 @@
|
|
|
17
17
|
import { ActionCodeSettings, Auth, User } from '../../model/public_types';
|
|
18
18
|
/**
|
|
19
19
|
* Gets the list of possible sign in methods for the given email address. This method returns an
|
|
20
|
-
* empty list when
|
|
21
|
-
*
|
|
20
|
+
* empty list when
|
|
21
|
+
* {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}
|
|
22
|
+
* is enabled, irrespective of the number of authentication methods available for the given email.
|
|
22
23
|
*
|
|
23
24
|
* @remarks
|
|
24
25
|
* This is useful to differentiate methods of sign-in for the same provider, eg.
|
|
@@ -30,7 +31,8 @@ import { ActionCodeSettings, Auth, User } from '../../model/public_types';
|
|
|
30
31
|
* @param email - The user's email address.
|
|
31
32
|
*
|
|
32
33
|
* Deprecated. Migrating off of this method is recommended as a security best-practice.
|
|
33
|
-
* Learn more in the Identity Platform documentation for
|
|
34
|
+
* Learn more in the Identity Platform documentation for
|
|
35
|
+
* {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}.
|
|
34
36
|
* @public
|
|
35
37
|
*/
|
|
36
38
|
export declare function fetchSignInMethodsForEmail(auth: Auth, email: string): Promise<string[]>;
|
|
@@ -18,7 +18,8 @@ import { ActionCodeInfo, ActionCodeSettings, Auth, UserCredential } from '../../
|
|
|
18
18
|
/**
|
|
19
19
|
* Sends a password reset email to the given email address. This method does not throw an error when
|
|
20
20
|
* there's no user account with the given email address and
|
|
21
|
-
*
|
|
21
|
+
* {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}
|
|
22
|
+
* is enabled.
|
|
22
23
|
*
|
|
23
24
|
* @remarks
|
|
24
25
|
* To complete the password reset, call {@link confirmPasswordReset} with the code supplied in
|
|
@@ -116,9 +117,10 @@ export declare function createUserWithEmailAndPassword(auth: Auth, email: string
|
|
|
116
117
|
* Asynchronously signs in using an email and password.
|
|
117
118
|
*
|
|
118
119
|
* @remarks
|
|
119
|
-
* Fails with an error if the email address and password do not match.
|
|
120
|
-
*
|
|
121
|
-
* this method fails with "auth/invalid-credential" in case of an invalid
|
|
120
|
+
* Fails with an error if the email address and password do not match. When
|
|
121
|
+
* {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}
|
|
122
|
+
* is enabled, this method fails with "auth/invalid-credential" in case of an invalid
|
|
123
|
+
* email/password.
|
|
122
124
|
*
|
|
123
125
|
* This method is not supported on {@link Auth} instances created with a
|
|
124
126
|
* {@link @firebase/app#FirebaseServerApp}.
|
|
@@ -44,7 +44,9 @@ export declare function updateProfile(user: User, { displayName, photoURL: photo
|
|
|
44
44
|
* @param user - The user.
|
|
45
45
|
* @param newEmail - The new email address.
|
|
46
46
|
*
|
|
47
|
-
* Throws "auth/operation-not-allowed" error when
|
|
47
|
+
* Throws "auth/operation-not-allowed" error when
|
|
48
|
+
* {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}
|
|
49
|
+
* is enabled.
|
|
48
50
|
* Deprecated - Use {@link verifyBeforeUpdateEmail} instead.
|
|
49
51
|
*
|
|
50
52
|
* @public
|
|
@@ -52,7 +52,7 @@ export interface Config {
|
|
|
52
52
|
/**
|
|
53
53
|
* Interface representing reCAPTCHA parameters.
|
|
54
54
|
*
|
|
55
|
-
* See the
|
|
55
|
+
* See the {@link https://developers.google.com/recaptcha/docs/display#render_param | reCAPTCHA docs}
|
|
56
56
|
* for the list of accepted parameters. All parameters are accepted except for `sitekey`: Firebase Auth
|
|
57
57
|
* provisions a reCAPTCHA for each project and will configure the site key upon rendering.
|
|
58
58
|
*
|
|
@@ -1,5 +1,5 @@
|
|
|
1
|
-
import { r as registerAuth, i as initializeAuth, a as indexedDBLocalPersistence, c as connectAuthEmulator } from './register-
|
|
2
|
-
export { Y as ActionCodeURL, m as AuthCredential, A as AuthErrorCodes, E as EmailAuthCredential, q as EmailAuthProvider, F as FacebookAuthProvider, t as GithubAuthProvider, G as GoogleAuthProvider, O as OAuthCredential, w as OAuthProvider, P as PhoneAuthCredential, S as SAMLAuthProvider, T as TotpMultiFactorGenerator, b as TotpSecret, x as TwitterAuthProvider, J as applyActionCode, e as beforeAuthStateChanged, K as checkActionCode, I as confirmPasswordReset, c as connectAuthEmulator, M as createUserWithEmailAndPassword, l as debugErrorMap, k as deleteUser, V as fetchSignInMethodsForEmail, a4 as getAdditionalUserInfo, a1 as getIdToken, a2 as getIdTokenResult, a6 as getMultiFactorResolver, n as inMemoryPersistence, a as indexedDBLocalPersistence, i as initializeAuth, d as initializeRecaptchaConfig, R as isSignInWithEmailLink, B as linkWithCredential, a7 as multiFactor, f as onAuthStateChanged, o as onIdTokenChanged, Z as parseActionCodeURL, p as prodErrorMap, C as reauthenticateWithCredential, a5 as reload, j as revokeAccessToken, W as sendEmailVerification, H as sendPasswordResetEmail, Q as sendSignInLinkToEmail, s as setPersistence, y as signInAnonymously, z as signInWithCredential, D as signInWithCustomToken, N as signInWithEmailAndPassword, U as signInWithEmailLink, h as signOut, a3 as unlink, g as updateCurrentUser, $ as updateEmail, a0 as updatePassword, _ as updateProfile, u as useDeviceLanguage, v as validatePassword, X as verifyBeforeUpdateEmail, L as verifyPasswordResetCode } from './register-
|
|
1
|
+
import { r as registerAuth, i as initializeAuth, a as indexedDBLocalPersistence, c as connectAuthEmulator } from './register-666daa09.js';
|
|
2
|
+
export { Y as ActionCodeURL, m as AuthCredential, A as AuthErrorCodes, E as EmailAuthCredential, q as EmailAuthProvider, F as FacebookAuthProvider, t as GithubAuthProvider, G as GoogleAuthProvider, O as OAuthCredential, w as OAuthProvider, P as PhoneAuthCredential, S as SAMLAuthProvider, T as TotpMultiFactorGenerator, b as TotpSecret, x as TwitterAuthProvider, J as applyActionCode, e as beforeAuthStateChanged, K as checkActionCode, I as confirmPasswordReset, c as connectAuthEmulator, M as createUserWithEmailAndPassword, l as debugErrorMap, k as deleteUser, V as fetchSignInMethodsForEmail, a4 as getAdditionalUserInfo, a1 as getIdToken, a2 as getIdTokenResult, a6 as getMultiFactorResolver, n as inMemoryPersistence, a as indexedDBLocalPersistence, i as initializeAuth, d as initializeRecaptchaConfig, R as isSignInWithEmailLink, B as linkWithCredential, a7 as multiFactor, f as onAuthStateChanged, o as onIdTokenChanged, Z as parseActionCodeURL, p as prodErrorMap, C as reauthenticateWithCredential, a5 as reload, j as revokeAccessToken, W as sendEmailVerification, H as sendPasswordResetEmail, Q as sendSignInLinkToEmail, s as setPersistence, y as signInAnonymously, z as signInWithCredential, D as signInWithCustomToken, N as signInWithEmailAndPassword, U as signInWithEmailLink, h as signOut, a3 as unlink, g as updateCurrentUser, $ as updateEmail, a0 as updatePassword, _ as updateProfile, u as useDeviceLanguage, v as validatePassword, X as verifyBeforeUpdateEmail, L as verifyPasswordResetCode } from './register-666daa09.js';
|
|
3
3
|
import { _getProvider, getApp } from '@firebase/app';
|
|
4
4
|
import { getDefaultEmulatorHost } from '@firebase/util';
|
|
5
5
|
import 'tslib';
|
|
@@ -1,5 +1,5 @@
|
|
|
1
|
-
import { a8 as STORAGE_AVAILABLE_KEY, a9 as _isIframe, aa as _isMobileBrowser, ab as _isIE10, ac as _isSafari, ad as _isIOS, ae as _assert, af as Delay, ag as _window, ah as isV2, ai as _createError, aj as _recaptchaV2ScriptUrl, ak as _loadJS, al as _generateCallbackName, am as _castAuth, an as _isHttpOrHttps, ao as _isWorker, ap as getRecaptchaParams, aq as _serverAppCurrentUserOperationNotSupportedError, z as signInWithCredential, ar as _assertLinkedStatus, B as linkWithCredential, C as reauthenticateWithCredential, as as startEnrollPhoneMfa, at as startSignInPhoneMfa, au as sendPhoneVerificationCode, av as _link$1, P as PhoneAuthCredential, aw as _getInstance, ax as _signInWithCredential, ay as _reauthenticate, m as AuthCredential, az as signInWithIdp, aA as _fail, aB as debugAssert, aC as _assertInstanceOf, aD as _generateEventId, aE as FederatedAuthProvider, aF as _persistenceKeyName, aG as _performApiRequest, aH as _getCurrentUrl, aI as _gapiScriptUrl, aJ as _emulatorUrl, aK as _isChromeIOS, aL as _isFirefox, aM as _isIOSStandalone, aN as BaseOAuthProvider, aO as _setWindowLocation, aP as MultiFactorAssertionImpl, aQ as finalizeEnrollPhoneMfa, aR as finalizeSignInPhoneMfa, r as registerAuth, i as initializeAuth, a as indexedDBLocalPersistence, e as beforeAuthStateChanged, o as onIdTokenChanged, c as connectAuthEmulator, aS as _setExternalJSProvider, aT as _isAndroid, aU as _isIOS7Or8 } from './register-
|
|
2
|
-
export { Y as ActionCodeURL, m as AuthCredential, A as AuthErrorCodes, aW as AuthImpl, E as EmailAuthCredential, q as EmailAuthProvider, F as FacebookAuthProvider, aY as FetchProvider, t as GithubAuthProvider, G as GoogleAuthProvider, O as OAuthCredential, w as OAuthProvider, P as PhoneAuthCredential, aZ as SAMLAuthCredential, S as SAMLAuthProvider, T as TotpMultiFactorGenerator, b as TotpSecret, x as TwitterAuthProvider, aV as UserImpl, ae as _assert, am as _castAuth, aA as _fail, aD as _generateEventId, aX as _getClientVersion, aw as _getInstance, aF as _persistenceKeyName, J as applyActionCode, e as beforeAuthStateChanged, K as checkActionCode, I as confirmPasswordReset, c as connectAuthEmulator, M as createUserWithEmailAndPassword, l as debugErrorMap, k as deleteUser, V as fetchSignInMethodsForEmail, a4 as getAdditionalUserInfo, a1 as getIdToken, a2 as getIdTokenResult, a6 as getMultiFactorResolver, n as inMemoryPersistence, a as indexedDBLocalPersistence, i as initializeAuth, d as initializeRecaptchaConfig, R as isSignInWithEmailLink, B as linkWithCredential, a7 as multiFactor, f as onAuthStateChanged, o as onIdTokenChanged, Z as parseActionCodeURL, p as prodErrorMap, C as reauthenticateWithCredential, a5 as reload, j as revokeAccessToken, W as sendEmailVerification, H as sendPasswordResetEmail, Q as sendSignInLinkToEmail, s as setPersistence, y as signInAnonymously, z as signInWithCredential, D as signInWithCustomToken, N as signInWithEmailAndPassword, U as signInWithEmailLink, h as signOut, a3 as unlink, g as updateCurrentUser, $ as updateEmail, a0 as updatePassword, _ as updateProfile, u as useDeviceLanguage, v as validatePassword, X as verifyBeforeUpdateEmail, L as verifyPasswordResetCode } from './register-
|
|
1
|
+
import { a8 as STORAGE_AVAILABLE_KEY, a9 as _isIframe, aa as _isMobileBrowser, ab as _isIE10, ac as _isSafari, ad as _isIOS, ae as _assert, af as Delay, ag as _window, ah as isV2, ai as _createError, aj as _recaptchaV2ScriptUrl, ak as _loadJS, al as _generateCallbackName, am as _castAuth, an as _isHttpOrHttps, ao as _isWorker, ap as getRecaptchaParams, aq as _serverAppCurrentUserOperationNotSupportedError, z as signInWithCredential, ar as _assertLinkedStatus, B as linkWithCredential, C as reauthenticateWithCredential, as as startEnrollPhoneMfa, at as startSignInPhoneMfa, au as sendPhoneVerificationCode, av as _link$1, P as PhoneAuthCredential, aw as _getInstance, ax as _signInWithCredential, ay as _reauthenticate, m as AuthCredential, az as signInWithIdp, aA as _fail, aB as debugAssert, aC as _assertInstanceOf, aD as _generateEventId, aE as FederatedAuthProvider, aF as _persistenceKeyName, aG as _performApiRequest, aH as _getCurrentUrl, aI as _gapiScriptUrl, aJ as _emulatorUrl, aK as _isChromeIOS, aL as _isFirefox, aM as _isIOSStandalone, aN as BaseOAuthProvider, aO as _setWindowLocation, aP as MultiFactorAssertionImpl, aQ as finalizeEnrollPhoneMfa, aR as finalizeSignInPhoneMfa, r as registerAuth, i as initializeAuth, a as indexedDBLocalPersistence, e as beforeAuthStateChanged, o as onIdTokenChanged, c as connectAuthEmulator, aS as _setExternalJSProvider, aT as _isAndroid, aU as _isIOS7Or8 } from './register-666daa09.js';
|
|
2
|
+
export { Y as ActionCodeURL, m as AuthCredential, A as AuthErrorCodes, aW as AuthImpl, E as EmailAuthCredential, q as EmailAuthProvider, F as FacebookAuthProvider, aY as FetchProvider, t as GithubAuthProvider, G as GoogleAuthProvider, O as OAuthCredential, w as OAuthProvider, P as PhoneAuthCredential, aZ as SAMLAuthCredential, S as SAMLAuthProvider, T as TotpMultiFactorGenerator, b as TotpSecret, x as TwitterAuthProvider, aV as UserImpl, ae as _assert, am as _castAuth, aA as _fail, aD as _generateEventId, aX as _getClientVersion, aw as _getInstance, aF as _persistenceKeyName, J as applyActionCode, e as beforeAuthStateChanged, K as checkActionCode, I as confirmPasswordReset, c as connectAuthEmulator, M as createUserWithEmailAndPassword, l as debugErrorMap, k as deleteUser, V as fetchSignInMethodsForEmail, a4 as getAdditionalUserInfo, a1 as getIdToken, a2 as getIdTokenResult, a6 as getMultiFactorResolver, n as inMemoryPersistence, a as indexedDBLocalPersistence, i as initializeAuth, d as initializeRecaptchaConfig, R as isSignInWithEmailLink, B as linkWithCredential, a7 as multiFactor, f as onAuthStateChanged, o as onIdTokenChanged, Z as parseActionCodeURL, p as prodErrorMap, C as reauthenticateWithCredential, a5 as reload, j as revokeAccessToken, W as sendEmailVerification, H as sendPasswordResetEmail, Q as sendSignInLinkToEmail, s as setPersistence, y as signInAnonymously, z as signInWithCredential, D as signInWithCustomToken, N as signInWithEmailAndPassword, U as signInWithEmailLink, h as signOut, a3 as unlink, g as updateCurrentUser, $ as updateEmail, a0 as updatePassword, _ as updateProfile, u as useDeviceLanguage, v as validatePassword, X as verifyBeforeUpdateEmail, L as verifyPasswordResetCode } from './register-666daa09.js';
|
|
3
3
|
import { getUA, querystring, getModularInstance, isEmpty, getExperimentalSetting, getDefaultEmulatorHost, querystringDecode } from '@firebase/util';
|
|
4
4
|
import { _isFirebaseServerApp, SDK_VERSION, _getProvider, getApp } from '@firebase/app';
|
|
5
5
|
import 'tslib';
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"type":"module"}
|
|
@@ -5640,7 +5640,8 @@ async function recachePasswordPolicy(auth) {
|
|
|
5640
5640
|
/**
|
|
5641
5641
|
* Sends a password reset email to the given email address. This method does not throw an error when
|
|
5642
5642
|
* there's no user account with the given email address and
|
|
5643
|
-
*
|
|
5643
|
+
* {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}
|
|
5644
|
+
* is enabled.
|
|
5644
5645
|
*
|
|
5645
5646
|
* @remarks
|
|
5646
5647
|
* To complete the password reset, call {@link confirmPasswordReset} with the code supplied in
|
|
@@ -5829,9 +5830,10 @@ async function createUserWithEmailAndPassword(auth, email, password) {
|
|
|
5829
5830
|
* Asynchronously signs in using an email and password.
|
|
5830
5831
|
*
|
|
5831
5832
|
* @remarks
|
|
5832
|
-
* Fails with an error if the email address and password do not match.
|
|
5833
|
-
*
|
|
5834
|
-
* this method fails with "auth/invalid-credential" in case of an invalid
|
|
5833
|
+
* Fails with an error if the email address and password do not match. When
|
|
5834
|
+
* {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}
|
|
5835
|
+
* is enabled, this method fails with "auth/invalid-credential" in case of an invalid
|
|
5836
|
+
* email/password.
|
|
5835
5837
|
*
|
|
5836
5838
|
* This method is not supported on {@link Auth} instances created with a
|
|
5837
5839
|
* {@link @firebase/app#FirebaseServerApp}.
|
|
@@ -6032,8 +6034,9 @@ async function createAuthUri(auth, request) {
|
|
|
6032
6034
|
*/
|
|
6033
6035
|
/**
|
|
6034
6036
|
* Gets the list of possible sign in methods for the given email address. This method returns an
|
|
6035
|
-
* empty list when
|
|
6036
|
-
*
|
|
6037
|
+
* empty list when
|
|
6038
|
+
* {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}
|
|
6039
|
+
* is enabled, irrespective of the number of authentication methods available for the given email.
|
|
6037
6040
|
*
|
|
6038
6041
|
* @remarks
|
|
6039
6042
|
* This is useful to differentiate methods of sign-in for the same provider, eg.
|
|
@@ -6045,7 +6048,8 @@ async function createAuthUri(auth, request) {
|
|
|
6045
6048
|
* @param email - The user's email address.
|
|
6046
6049
|
*
|
|
6047
6050
|
* Deprecated. Migrating off of this method is recommended as a security best-practice.
|
|
6048
|
-
* Learn more in the Identity Platform documentation for
|
|
6051
|
+
* Learn more in the Identity Platform documentation for
|
|
6052
|
+
* {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}.
|
|
6049
6053
|
* @public
|
|
6050
6054
|
*/
|
|
6051
6055
|
async function fetchSignInMethodsForEmail(auth, email) {
|
|
@@ -6242,7 +6246,9 @@ async function updateProfile(user, { displayName, photoURL: photoUrl }) {
|
|
|
6242
6246
|
* @param user - The user.
|
|
6243
6247
|
* @param newEmail - The new email address.
|
|
6244
6248
|
*
|
|
6245
|
-
* Throws "auth/operation-not-allowed" error when
|
|
6249
|
+
* Throws "auth/operation-not-allowed" error when
|
|
6250
|
+
* {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}
|
|
6251
|
+
* is enabled.
|
|
6246
6252
|
* Deprecated - Use {@link verifyBeforeUpdateEmail} instead.
|
|
6247
6253
|
*
|
|
6248
6254
|
* @public
|
|
@@ -7749,7 +7755,7 @@ function _isEmptyString(input) {
|
|
|
7749
7755
|
}
|
|
7750
7756
|
|
|
7751
7757
|
var name = "@firebase/auth";
|
|
7752
|
-
var version = "1.7.
|
|
7758
|
+
var version = "1.7.2-canary.14f9da66f";
|
|
7753
7759
|
|
|
7754
7760
|
/**
|
|
7755
7761
|
* @license
|
|
@@ -7896,4 +7902,4 @@ function registerAuth(clientPlatform) {
|
|
|
7896
7902
|
}
|
|
7897
7903
|
|
|
7898
7904
|
export { updateEmail as $, AUTH_ERROR_CODES_MAP_DO_NOT_USE_INTERNALLY as A, linkWithCredential as B, reauthenticateWithCredential as C, signInWithCustomToken as D, EmailAuthCredential as E, FacebookAuthProvider as F, GoogleAuthProvider as G, sendPasswordResetEmail as H, confirmPasswordReset as I, applyActionCode as J, checkActionCode as K, verifyPasswordResetCode as L, createUserWithEmailAndPassword as M, signInWithEmailAndPassword as N, OAuthCredential as O, PhoneAuthCredential as P, sendSignInLinkToEmail as Q, isSignInWithEmailLink as R, SAMLAuthProvider as S, TotpMultiFactorGenerator as T, signInWithEmailLink as U, fetchSignInMethodsForEmail as V, sendEmailVerification as W, verifyBeforeUpdateEmail as X, ActionCodeURL as Y, parseActionCodeURL as Z, updateProfile as _, indexedDBLocalPersistence as a, updatePassword as a0, getIdToken as a1, getIdTokenResult as a2, unlink as a3, getAdditionalUserInfo as a4, reload as a5, getMultiFactorResolver as a6, multiFactor as a7, STORAGE_AVAILABLE_KEY as a8, _isIframe as a9, _fail as aA, debugAssert as aB, _assertInstanceOf as aC, _generateEventId as aD, FederatedAuthProvider as aE, _persistenceKeyName as aF, _performApiRequest as aG, _getCurrentUrl as aH, _gapiScriptUrl as aI, _emulatorUrl as aJ, _isChromeIOS as aK, _isFirefox as aL, _isIOSStandalone as aM, BaseOAuthProvider as aN, _setWindowLocation as aO, MultiFactorAssertionImpl as aP, finalizeEnrollPhoneMfa as aQ, finalizeSignInPhoneMfa as aR, _setExternalJSProvider as aS, _isAndroid as aT, _isIOS7Or8 as aU, UserImpl as aV, AuthImpl as aW, _getClientVersion as aX, FetchProvider as aY, SAMLAuthCredential as aZ, _isMobileBrowser as aa, _isIE10 as ab, _isSafari as ac, _isIOS as ad, _assert as ae, Delay as af, _window as ag, isV2 as ah, _createError as ai, _recaptchaV2ScriptUrl as aj, _loadJS as ak, _generateCallbackName as al, _castAuth as am, _isHttpOrHttps as an, _isWorker as ao, getRecaptchaParams as ap, _serverAppCurrentUserOperationNotSupportedError as aq, _assertLinkedStatus as ar, startEnrollPhoneMfa as as, startSignInPhoneMfa as at, sendPhoneVerificationCode as au, _link as av, _getInstance as aw, _signInWithCredential as ax, _reauthenticate as ay, signInWithIdp as az, TotpSecret as b, connectAuthEmulator as c, initializeRecaptchaConfig as d, beforeAuthStateChanged as e, onAuthStateChanged as f, updateCurrentUser as g, signOut as h, initializeAuth as i, revokeAccessToken as j, deleteUser as k, debugErrorMap as l, AuthCredential as m, inMemoryPersistence as n, onIdTokenChanged as o, prodErrorMap as p, EmailAuthProvider as q, registerAuth as r, setPersistence as s, GithubAuthProvider as t, useDeviceLanguage as u, validatePassword as v, OAuthProvider as w, TwitterAuthProvider as x, signInAnonymously as y, signInWithCredential as z };
|
|
7899
|
-
//# sourceMappingURL=register-
|
|
7905
|
+
//# sourceMappingURL=register-666daa09.js.map
|