@@ -443,11 +443,15 @@ const findUsersWithAuthData = async (config, authData, beforeFind) => {
443
443
} ;
444
444
445
445
const hasMutatedAuthData = ( authData , userAuthData ) => {
446
- if ( ! userAuthData ) { return { hasMutatedAuthData : true , mutatedAuthData : authData } ; }
446
+ if ( ! userAuthData ) {
447
+ return { hasMutatedAuthData : true , mutatedAuthData : authData } ;
448
+ }
447
449
const mutatedAuthData = { } ;
448
450
Object . keys ( authData ) . forEach ( provider => {
449
451
// Anonymous provider is not handled this way
450
- if ( provider === 'anonymous' ) { return ; }
452
+ if ( provider === 'anonymous' ) {
453
+ return ;
454
+ }
451
455
const providerData = authData [ provider ] ;
452
456
const userProviderAuthData = userAuthData [ provider ] ;
453
457
if ( ! isDeepStrictEqual ( providerData , userProviderAuthData ) ) {
@@ -505,13 +509,11 @@ const checkIfUserHasProvidedConfiguredProvidersForLogin = (
505
509
return ;
506
510
}
507
511
508
- let errorMsg = `Missing additional authData ${ additionProvidersNotFound . join ( ',' ) } `
509
- if ( additionProvidersNotFound . length > 0 ) {
512
+ let errorMsg = `Missing additional authData ${ additionProvidersNotFound . join ( ',' ) } ` ;
513
+ if ( additionProvidersNotFound . length > 0 ) {
510
514
const mfaData = userAuthData . mfa || { } ;
511
- const needsToken = ! mfaData . secret && ( mfaData . email || mfaData . mobile ) ;
512
- const additionalInfo = needsToken
513
- ? " (include 'request' as token to receive a verification code)"
514
- : "" ;
515
+ const needsToken = ! mfaData . secret ;
516
+ const additionalInfo = needsToken ? ' Send request for additional auth data' : '' ;
515
517
516
518
errorMsg += additionalInfo ;
517
519
}
0 commit comments