| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568 |
- // Copyright 2023 Google LLC
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- import FirebaseCore
- import FirebaseCoreExtension
- import FirebaseCoreInternal
- import Foundation
- #if COCOAPODS
- import GTMSessionFetcher
- #else
- import GTMSessionFetcherCore
- #endif
- @available(iOS 13, tvOS 13, macOS 10.15, macCatalyst 13, watchOS 7, *)
- protocol AuthBackendRPCIssuer: NSObjectProtocol {
- /** @fn
- @brief Asynchronously sends a HTTP request.
- @param requestConfiguration The request to be made.
- @param URL The request URL.
- @param body Request body.
- @param contentType Content type of the body.
- @param handler provided that handles HTTP response. Invoked asynchronously on the auth global
- work queue in the future.
- */
- func asyncCallToURL<T: AuthRPCRequest>(with request: T,
- body: Data?,
- contentType: String,
- completionHandler: @escaping ((Data?, Error?) -> Void))
- }
- @available(iOS 13, tvOS 13, macOS 10.15, macCatalyst 13, watchOS 7, *)
- class AuthBackendRPCIssuerImplementation: NSObject, AuthBackendRPCIssuer {
- let fetcherService: GTMSessionFetcherService
- override init() {
- fetcherService = GTMSessionFetcherService()
- fetcherService.userAgent = AuthBackend.authUserAgent()
- fetcherService.callbackQueue = kAuthGlobalWorkQueue
- // Avoid reusing the session to prevent
- // https://github.com/firebase/firebase-ios-sdk/issues/1261
- fetcherService.reuseSession = false
- }
- func asyncCallToURL<T: AuthRPCRequest>(with request: T,
- body: Data?,
- contentType: String,
- completionHandler: @escaping ((Data?, Error?)
- -> Void)) {
- let requestConfiguration = request.requestConfiguration()
- AuthBackend.request(withURL: request.requestURL(),
- contentType: contentType,
- requestConfiguration: requestConfiguration) { request in
- let fetcher = self.fetcherService.fetcher(with: request)
- if let _ = requestConfiguration.emulatorHostAndPort {
- fetcher.allowLocalhostRequest = true
- fetcher.allowedInsecureSchemes = ["http"]
- }
- fetcher.bodyData = body
- fetcher.beginFetch(completionHandler: completionHandler)
- }
- }
- }
- @available(iOS 13, tvOS 13, macOS 10.15, macCatalyst 13, watchOS 7, *)
- class AuthBackend: NSObject {
- static func authUserAgent() -> String {
- return "FirebaseAuth.iOS/\(FirebaseVersion()) \(GTMFetcherStandardUserAgentString(nil))"
- }
- private static var gBackendImplementation: AuthBackendImplementation?
- class func setDefaultBackendImplementationWithRPCIssuer(issuer: AuthBackendRPCIssuer?) {
- let defaultImplementation = AuthBackendRPCImplementation()
- if let issuer = issuer {
- defaultImplementation.rpcIssuer = issuer
- }
- gBackendImplementation = defaultImplementation
- }
- class func implementation() -> AuthBackendImplementation {
- if gBackendImplementation == nil {
- gBackendImplementation = AuthBackendRPCImplementation()
- }
- return gBackendImplementation!
- }
- class func call<T: AuthRPCRequest>(with request: T) async throws -> T.Response {
- return try await implementation().call(with: request)
- }
- class func request(withURL url: URL,
- contentType: String,
- requestConfiguration: AuthRequestConfiguration,
- completion: @escaping (URLRequest) -> Void) {
- var request = URLRequest(url: url)
- request.setValue(contentType, forHTTPHeaderField: "Content-Type")
- let additionalFrameworkMarker = requestConfiguration
- .additionalFrameworkMarker ?? "FirebaseCore-iOS"
- let clientVersion = "iOS/FirebaseSDK/\(FirebaseVersion())/\(additionalFrameworkMarker)"
- request.setValue(clientVersion, forHTTPHeaderField: "X-Client-Version")
- request.setValue(Bundle.main.bundleIdentifier, forHTTPHeaderField: "X-Ios-Bundle-Identifier")
- request.setValue(requestConfiguration.appID, forHTTPHeaderField: "X-Firebase-GMPID")
- if let heartbeatLogger = requestConfiguration.heartbeatLogger {
- request.setValue(heartbeatLogger.headerValue(), forHTTPHeaderField: "X-Firebase-Client")
- }
- request.httpMethod = requestConfiguration.httpMethod
- let preferredLocalizations = Bundle.main.preferredLocalizations
- if preferredLocalizations.count > 0 {
- request.setValue(preferredLocalizations.first, forHTTPHeaderField: "Accept-Language")
- }
- if let languageCode = requestConfiguration.languageCode,
- languageCode.count > 0 {
- request.setValue(languageCode, forHTTPHeaderField: "X-Firebase-Locale")
- }
- if let appCheck = requestConfiguration.appCheck {
- appCheck.getToken(forcingRefresh: false) { tokenResult in
- if let error = tokenResult.error {
- AuthLog.logWarning(code: "I-AUT000018",
- message: "Error getting App Check token; using placeholder " +
- "token instead. Error: \(error)")
- }
- request.setValue(tokenResult.token, forHTTPHeaderField: "X-Firebase-AppCheck")
- completion(request)
- }
- } else {
- completion(request)
- }
- }
- }
- @available(iOS 13, tvOS 13, macOS 10.15, macCatalyst 13, watchOS 7, *)
- protocol AuthBackendImplementation {
- func call<T: AuthRPCRequest>(with request: T) async throws -> T.Response
- }
- @available(iOS 13, tvOS 13, macOS 10.15, macCatalyst 13, watchOS 7, *)
- private class AuthBackendRPCImplementation: NSObject, AuthBackendImplementation {
- var rpcIssuer: AuthBackendRPCIssuer
- override init() {
- rpcIssuer = AuthBackendRPCIssuerImplementation()
- }
- /** @fn call
- @brief Calls the RPC using HTTP request.
- @remarks Possible error responses:
- @see FIRAuthInternalErrorCodeRPCRequestEncodingError
- @see FIRAuthInternalErrorCodeJSONSerializationError
- @see FIRAuthInternalErrorCodeNetworkError
- @see FIRAuthInternalErrorCodeUnexpectedErrorResponse
- @see FIRAuthInternalErrorCodeUnexpectedResponse
- @see FIRAuthInternalErrorCodeRPCResponseDecodingError
- @param request The request.
- @param response The empty response to be filled.
- @param callback The callback for both success and failure.
- */
- fileprivate func call<T: AuthRPCRequest>(with request: T) async throws -> T.Response {
- let response = try await callInternal(with: request)
- if let auth = request.requestConfiguration().auth,
- let mfaError = Self.generateMFAError(response: response, auth: auth) {
- throw mfaError
- } else if let error = Self.phoneCredentialInUse(response: response) {
- throw error
- } else {
- return response
- }
- }
- #if os(iOS)
- private class func generateMFAError(response: AuthRPCResponse, auth: Auth) -> Error? {
- if let mfaResponse = response as? AuthMFAResponse,
- mfaResponse.idToken == nil,
- let enrollments = mfaResponse.mfaInfo {
- var info: [MultiFactorInfo] = []
- for enrollment in enrollments {
- // check which MFA factors are enabled.
- if let _ = enrollment.phoneInfo {
- info.append(PhoneMultiFactorInfo(proto: enrollment))
- } else if let _ = enrollment.totpInfo {
- info.append(TOTPMultiFactorInfo(proto: enrollment))
- } else {
- AuthLog.logError(code: "I-AUT000021", message: "Multifactor type is not supported")
- }
- }
- return AuthErrorUtils.secondFactorRequiredError(
- pendingCredential: mfaResponse.mfaPendingCredential,
- hints: info,
- auth: auth
- )
- } else {
- return nil
- }
- }
- #else
- private class func generateMFAError(response: AuthRPCResponse, auth: Auth?) -> Error? {
- return nil
- }
- #endif
- #if os(iOS)
- // Check whether or not the successful response is actually the special case phone
- // auth flow that returns a temporary proof and phone number.
- private class func phoneCredentialInUse(response: AuthRPCResponse) -> Error? {
- if let phoneAuthResponse = response as? VerifyPhoneNumberResponse,
- let phoneNumber = phoneAuthResponse.phoneNumber,
- phoneNumber.count > 0,
- let temporaryProof = phoneAuthResponse.temporaryProof,
- temporaryProof.count > 0 {
- let credential = PhoneAuthCredential(withTemporaryProof: temporaryProof,
- phoneNumber: phoneNumber,
- providerID: PhoneAuthProvider.id)
- return AuthErrorUtils.credentialAlreadyInUseError(message: nil,
- credential: credential,
- email: nil)
- } else {
- return nil
- }
- }
- #else
- private class func phoneCredentialInUse(response: AuthRPCResponse) -> Error? {
- return nil
- }
- #endif
- /** @fn call
- @brief Calls the RPC using HTTP request.
- @remarks Possible error responses:
- @see FIRAuthInternalErrorCodeRPCRequestEncodingError
- @see FIRAuthInternalErrorCodeJSONSerializationError
- @see FIRAuthInternalErrorCodeNetworkError
- @see FIRAuthInternalErrorCodeUnexpectedErrorResponse
- @see FIRAuthInternalErrorCodeUnexpectedResponse
- @see FIRAuthInternalErrorCodeRPCResponseDecodingError
- @param request The request.
- @param response The empty response to be filled.
- @param callback The callback for both success and failure.
- */
- fileprivate func callInternal<T: AuthRPCRequest>(with request: T) async throws -> T.Response {
- var bodyData: Data?
- if request.containsPostBody {
- var postBody: [String: AnyHashable]
- do {
- // TODO: Can unencodedHTTPRequestBody ever throw?
- // They don't today, but there are a few fatalErrors that might better be implemented as
- // thrown errors.. Although perhaps the case of 'containsPostBody' returning false could
- // perhaps be modeled differently so that the failing unencodedHTTPRequestBody could only
- // be called when a body exists...
- postBody = try request.unencodedHTTPRequestBody()
- } catch {
- throw AuthErrorUtils.RPCRequestEncodingError(underlyingError: error)
- }
- var JSONWritingOptions: JSONSerialization.WritingOptions = .init(rawValue: 0)
- #if DEBUG
- JSONWritingOptions = JSONSerialization.WritingOptions.prettyPrinted
- #endif
- guard JSONSerialization.isValidJSONObject(postBody) else {
- throw AuthErrorUtils.JSONSerializationErrorForUnencodableType()
- }
- bodyData = try? JSONSerialization.data(
- withJSONObject: postBody,
- options: JSONWritingOptions
- )
- if bodyData == nil {
- // This is an untested case. This happens exclusively when there is an error in the
- // framework implementation of dataWithJSONObject:options:error:. This shouldn't normally
- // occur as isValidJSONObject: should return NO in any case we should encounter an error.
- throw AuthErrorUtils.JSONSerializationErrorForUnencodableType()
- }
- }
- return try await withCheckedThrowingContinuation { continuation in
- rpcIssuer
- .asyncCallToURL(with: request, body: bodyData, contentType: "application/json") {
- data, error in
- // If there is an error with no body data at all, then this must be a
- // network error.
- guard let data = data else {
- if let error = error {
- continuation.resume(throwing: AuthErrorUtils.networkError(underlyingError: error))
- return
- } else {
- // TODO: this was ignored before
- fatalError("Auth Internal error: RPC call didn't return data or an error.")
- }
- }
- // Try to decode the HTTP response data which may contain either a
- // successful response or error message.
- var dictionary: [String: AnyHashable]
- do {
- let rawDecode = try JSONSerialization.jsonObject(with: data,
- options: JSONSerialization
- .ReadingOptions
- .mutableLeaves)
- guard let decodedDictionary = rawDecode as? [String: AnyHashable] else {
- if error != nil {
- continuation.resume(
- throwing: AuthErrorUtils.unexpectedErrorResponse(deserializedResponse: rawDecode,
- underlyingError: error)
- )
- return
- } else {
- continuation.resume(
- throwing: AuthErrorUtils.unexpectedResponse(deserializedResponse: rawDecode)
- )
- return
- }
- }
- dictionary = decodedDictionary
- } catch let jsonError {
- if error != nil {
- // We have an error, but we couldn't decode the body, so we have no
- // additional information other than the raw response and the
- // original NSError (the jsonError is inferred by the error code
- // (AuthErrorCodeUnexpectedHTTPResponse, and is irrelevant.)
- continuation.resume(
- throwing: AuthErrorUtils.unexpectedErrorResponse(
- data: data,
- underlyingError: error
- )
- )
- return
- } else {
- // This is supposed to be a "successful" response, but we couldn't
- // deserialize the body.
- continuation.resume(
- throwing: AuthErrorUtils.unexpectedResponse(data: data, underlyingError: jsonError)
- )
- return
- }
- }
- let response = T.Response()
- // At this point we either have an error with successfully decoded
- // details in the body, or we have a response which must pass further
- // validation before we know it's truly successful. We deal with the
- // case where we have an error with successfully decoded error details
- // first:
- if error != nil {
- if let errorDictionary = dictionary["error"] as? [String: AnyHashable] {
- if let errorMessage = errorDictionary["message"] as? String {
- if let clientError = AuthBackendRPCImplementation.clientError(
- withServerErrorMessage: errorMessage,
- errorDictionary: errorDictionary,
- response: response,
- error: error
- ) {
- continuation.resume(throwing: clientError)
- return
- }
- }
- // Not a message we know, return the message directly.
- continuation.resume(
- throwing: AuthErrorUtils.unexpectedErrorResponse(
- deserializedResponse: errorDictionary,
- underlyingError: error
- )
- )
- return
- }
- // No error message at all, return the decoded response.
- continuation.resume(
- throwing: AuthErrorUtils
- .unexpectedErrorResponse(deserializedResponse: dictionary, underlyingError: error)
- )
- return
- }
- // Finally, we try to populate the response object with the JSON values.
- do {
- try response.setFields(dictionary: dictionary)
- } catch {
- continuation.resume(
- throwing: AuthErrorUtils
- .RPCResponseDecodingError(deserializedResponse: dictionary, underlyingError: error)
- )
- return
- }
- // In case returnIDPCredential of a verifyAssertion request is set to
- // @YES, the server may return a 200 with a response that may contain a
- // server error.
- if let verifyAssertionRequest = request as? VerifyAssertionRequest {
- if verifyAssertionRequest.returnIDPCredential {
- if let errorMessage = dictionary["errorMessage"] as? String {
- if let clientError = AuthBackendRPCImplementation.clientError(
- withServerErrorMessage: errorMessage,
- errorDictionary: dictionary,
- response: response,
- error: error
- ) {
- continuation.resume(throwing: clientError)
- return
- }
- }
- }
- }
- continuation.resume(returning: response)
- }
- }
- }
- private class func clientError(withServerErrorMessage serverErrorMessage: String,
- errorDictionary: [String: Any],
- response: AuthRPCResponse,
- error: Error?) -> Error? {
- let split = serverErrorMessage.split(separator: ":")
- let shortErrorMessage = split.first?.trimmingCharacters(in: .whitespacesAndNewlines)
- let serverDetailErrorMessage = String(split.count > 1 ? split[1] : "")
- .trimmingCharacters(in: .whitespacesAndNewlines)
- switch shortErrorMessage {
- case "USER_NOT_FOUND": return AuthErrorUtils
- .userNotFoundError(message: serverDetailErrorMessage)
- case "MISSING_CONTINUE_URI": return AuthErrorUtils
- .missingContinueURIError(message: serverDetailErrorMessage)
- // "INVALID_IDENTIFIER" can be returned by createAuthURI RPC. Considering email addresses are
- // currently the only identifiers, we surface the FIRAuthErrorCodeInvalidEmail error code in
- // this case.
- case "INVALID_IDENTIFIER": return AuthErrorUtils
- .invalidEmailError(message: serverDetailErrorMessage)
- case "INVALID_ID_TOKEN": return AuthErrorUtils
- .invalidUserTokenError(message: serverDetailErrorMessage)
- case "CREDENTIAL_TOO_OLD_LOGIN_AGAIN": return AuthErrorUtils
- .requiresRecentLoginError(message: serverDetailErrorMessage)
- case "EMAIL_EXISTS": return AuthErrorUtils
- .emailAlreadyInUseError(email: nil)
- case "OPERATION_NOT_ALLOWED": return AuthErrorUtils
- .operationNotAllowedError(message: serverDetailErrorMessage)
- case "PASSWORD_LOGIN_DISABLED": return AuthErrorUtils
- .operationNotAllowedError(message: serverDetailErrorMessage)
- case "USER_DISABLED": return AuthErrorUtils
- .userDisabledError(message: serverDetailErrorMessage)
- case "INVALID_EMAIL": return AuthErrorUtils
- .invalidEmailError(message: serverDetailErrorMessage)
- case "EXPIRED_OOB_CODE": return AuthErrorUtils
- .expiredActionCodeError(message: serverDetailErrorMessage)
- case "INVALID_OOB_CODE": return AuthErrorUtils
- .invalidActionCodeError(message: serverDetailErrorMessage)
- case "INVALID_MESSAGE_PAYLOAD": return AuthErrorUtils
- .invalidMessagePayloadError(message: serverDetailErrorMessage)
- case "INVALID_SENDER": return AuthErrorUtils
- .invalidSenderError(message: serverDetailErrorMessage)
- case "INVALID_RECIPIENT_EMAIL": return AuthErrorUtils
- .invalidRecipientEmailError(message: serverDetailErrorMessage)
- case "WEAK_PASSWORD": return AuthErrorUtils
- .weakPasswordError(serverResponseReason: serverDetailErrorMessage)
- case "TOO_MANY_ATTEMPTS_TRY_LATER": return AuthErrorUtils
- .tooManyRequestsError(message: serverDetailErrorMessage)
- case "EMAIL_NOT_FOUND": return AuthErrorUtils
- .userNotFoundError(message: serverDetailErrorMessage)
- case "MISSING_EMAIL": return AuthErrorUtils
- .missingEmailError(message: serverDetailErrorMessage)
- case "MISSING_IOS_BUNDLE_ID": return AuthErrorUtils
- .missingIosBundleIDError(message: serverDetailErrorMessage)
- case "MISSING_ANDROID_PACKAGE_NAME": return AuthErrorUtils
- .missingAndroidPackageNameError(message: serverDetailErrorMessage)
- case "UNAUTHORIZED_DOMAIN": return AuthErrorUtils
- .unauthorizedDomainError(message: serverDetailErrorMessage)
- case "INVALID_CONTINUE_URI": return AuthErrorUtils
- .invalidContinueURIError(message: serverDetailErrorMessage)
- case "INVALID_PASSWORD": return AuthErrorUtils
- .wrongPasswordError(message: serverDetailErrorMessage)
- case "INVALID_IDP_RESPONSE": return AuthErrorUtils
- .invalidCredentialError(message: serverDetailErrorMessage)
- case "INVALID_PENDING_TOKEN": return AuthErrorUtils
- .invalidCredentialError(message: serverDetailErrorMessage)
- case "INVALID_LOGIN_CREDENTIALS": return AuthErrorUtils
- .invalidCredentialError(message: serverDetailErrorMessage)
- case "INVALID_CUSTOM_TOKEN": return AuthErrorUtils
- .invalidCustomTokenError(message: serverDetailErrorMessage)
- case "CREDENTIAL_MISMATCH": return AuthErrorUtils
- .customTokenMismatchError(message: serverDetailErrorMessage)
- case "INVALID_PHONE_NUMBER": return AuthErrorUtils
- .invalidPhoneNumberError(message: serverDetailErrorMessage)
- case "QUOTA_EXCEEDED": return AuthErrorUtils
- .quotaExceededError(message: serverDetailErrorMessage)
- case "APP_NOT_VERIFIED": return AuthErrorUtils
- .appNotVerifiedError(message: serverDetailErrorMessage)
- case "CAPTCHA_CHECK_FAILED": return AuthErrorUtils
- .captchaCheckFailedError(message: serverDetailErrorMessage)
- case "INVALID_APP_CREDENTIAL": return AuthErrorUtils
- .invalidAppCredential(message: serverDetailErrorMessage)
- case "MISSING_APP_CREDENTIAL": return AuthErrorUtils
- .missingAppCredential(message: serverDetailErrorMessage)
- case "INVALID_CODE": return AuthErrorUtils
- .invalidVerificationCodeError(message: serverDetailErrorMessage)
- case "INVALID_SESSION_INFO": return AuthErrorUtils
- .invalidVerificationIDError(message: serverDetailErrorMessage)
- case "SESSION_EXPIRED": return AuthErrorUtils
- .sessionExpiredError(message: serverDetailErrorMessage)
- case "ADMIN_ONLY_OPERATION": return AuthErrorUtils
- .error(code: AuthErrorCode.adminRestrictedOperation, message: serverDetailErrorMessage)
- case "BLOCKING_FUNCTION_ERROR_RESPONSE": return AuthErrorUtils
- .blockingCloudFunctionServerResponse(message: serverDetailErrorMessage)
- case "EMAIL_CHANGE_NEEDS_VERIFICATION": return AuthErrorUtils
- .error(code: AuthErrorCode.emailChangeNeedsVerification, message: serverDetailErrorMessage)
- case "INVALID_MFA_PENDING_CREDENTIAL": return AuthErrorUtils
- .error(code: AuthErrorCode.invalidMultiFactorSession, message: serverDetailErrorMessage)
- case "INVALID_PROVIDER_ID": return AuthErrorUtils
- .invalidProviderIDError(message: serverDetailErrorMessage)
- case "MFA_ENROLLMENT_NOT_FOUND": return AuthErrorUtils
- .error(code: AuthErrorCode.multiFactorInfoNotFound, message: serverDetailErrorMessage)
- case "MISSING_CLIENT_IDENTIFIER": return AuthErrorUtils
- .missingClientIdentifierError(message: serverDetailErrorMessage)
- case "MISSING_IOS_APP_TOKEN": return AuthErrorUtils
- .missingAppTokenError(underlyingError: nil)
- case "MISSING_MFA_ENROLLMENT_ID": return AuthErrorUtils
- .error(code: AuthErrorCode.missingMultiFactorInfo, message: serverDetailErrorMessage)
- case "MISSING_MFA_PENDING_CREDENTIAL": return AuthErrorUtils
- .error(code: AuthErrorCode.missingMultiFactorSession, message: serverDetailErrorMessage)
- case "MISSING_OR_INVALID_NONCE": return AuthErrorUtils
- .missingOrInvalidNonceError(message: serverDetailErrorMessage)
- case "SECOND_FACTOR_EXISTS": return AuthErrorUtils
- .error(code: AuthErrorCode.secondFactorAlreadyEnrolled, message: serverDetailErrorMessage)
- case "SECOND_FACTOR_LIMIT_EXCEEDED": return AuthErrorUtils
- .error(
- code: AuthErrorCode.maximumSecondFactorCountExceeded,
- message: serverDetailErrorMessage
- )
- case "TENANT_ID_MISMATCH": return AuthErrorUtils
- .tenantIDMismatchError()
- case "TOKEN_EXPIRED": return AuthErrorUtils
- .userTokenExpiredError(message: serverDetailErrorMessage)
- case "UNSUPPORTED_FIRST_FACTOR": return AuthErrorUtils
- .error(code: AuthErrorCode.unsupportedFirstFactor, message: serverDetailErrorMessage)
- case "UNSUPPORTED_TENANT_OPERATION": return AuthErrorUtils
- .unsupportedTenantOperationError()
- case "UNVERIFIED_EMAIL": return AuthErrorUtils
- .error(code: AuthErrorCode.unverifiedEmail, message: serverDetailErrorMessage)
- case "FEDERATED_USER_ID_ALREADY_LINKED":
- guard let verifyAssertion = response as? VerifyAssertionResponse else {
- return AuthErrorUtils.credentialAlreadyInUseError(
- message: serverDetailErrorMessage, credential: nil, email: nil
- )
- }
- let credential = OAuthCredential(withVerifyAssertionResponse: verifyAssertion)
- let email = verifyAssertion.email
- return AuthErrorUtils.credentialAlreadyInUseError(
- message: serverDetailErrorMessage, credential: credential, email: email
- )
- default:
- if let underlyingErrors = errorDictionary["errors"] as? [[String: String]] {
- for underlyingError in underlyingErrors {
- if let reason = underlyingError["reason"] {
- if reason.starts(with: "keyInvalid") {
- return AuthErrorUtils.invalidAPIKeyError()
- }
- if underlyingError["reason"] == "ipRefererBlocked" {
- return AuthErrorUtils.appNotAuthorizedError()
- }
- }
- }
- }
- }
- return nil
- }
- }
|