Skip to content

Commit 6402a68

Browse files
committed
Fix linter issues
1 parent 9731144 commit 6402a68

File tree

3 files changed

+8
-7
lines changed

3 files changed

+8
-7
lines changed

packages-exp/auth-compat-exp/src/user_credential.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ function modifyError(auth: exp.Auth, e: FirebaseError): void {
4242
const mfaErr = e as compat.MultiFactorError;
4343
mfaErr.resolver = new MultiFactorResolver(
4444
auth,
45-
exp.getMultiFactorResolver(auth, e as any)
45+
exp.getMultiFactorResolver(auth, e as exp.MultiFactorError)
4646
);
4747
} else if (response) {
4848
const credential = credentialFromObject(e);
@@ -120,7 +120,7 @@ function credentialFromObject(
120120
}
121121
// TODO(avolkovi): uncomment this and get it working with SAML & OIDC
122122
if (pendingToken) {
123-
if (providerId.indexOf('saml.') == 0) {
123+
if (providerId.startsWith('saml.')) {
124124
return exp.SAMLAuthCredential._create(providerId, pendingToken);
125125
} else {
126126
// OIDC and non-default providers excluding Twitter.

packages-exp/auth-exp/src/mfa/mfa_resolver.ts

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,8 @@ import {
1919
Auth,
2020
MultiFactorResolver,
2121
OperationType,
22-
UserCredential
22+
UserCredential,
23+
MultiFactorError
2324
} from '../model/public_types';
2425

2526
import { _castAuth } from '../core/auth/auth_impl';
@@ -28,7 +29,7 @@ import { UserCredentialImpl } from '../core/user/user_credential_impl';
2829
import { _assert, _fail } from '../core/util/assert';
2930
import { UserCredentialInternal } from '../model/user';
3031
import { MultiFactorAssertionImpl } from './mfa_assertion';
31-
import { MultiFactorError } from './mfa_error';
32+
import { MultiFactorError as MultiFactorErrorInternal } from './mfa_error';
3233
import { MultiFactorInfoImpl } from './mfa_info';
3334
import { MultiFactorSessionImpl } from './mfa_session';
3435

@@ -44,7 +45,7 @@ export class MultiFactorResolverImpl implements MultiFactorResolver {
4445
/** @internal */
4546
static _fromError(
4647
authExtern: Auth,
47-
error: MultiFactorError
48+
error: MultiFactorErrorInternal
4849
): MultiFactorResolverImpl {
4950
const auth = _castAuth(authExtern);
5051
const hints = (error.serverResponse.mfaInfo || []).map(enrollment =>
@@ -124,7 +125,7 @@ export function getMultiFactorResolver(
124125
auth: Auth,
125126
error: MultiFactorError
126127
): MultiFactorResolver {
127-
const errorInternal = error as MultiFactorError;
128+
const errorInternal = error as MultiFactorErrorInternal;
128129
_assert(error.operationType, auth, AuthErrorCode.ARGUMENT_ERROR);
129130
_assert(
130131
errorInternal.serverResponse?.mfaPendingCredential,

packages-exp/auth-exp/test/integration/webdriver/persistence.test.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ browserDescribe('WebDriver persistence test', driver => {
129129
expect(await driver.getUserSnapshot()).to.contain({ uid });
130130
});
131131

132-
it.only('fall back to in-memory if neither indexedDB or localStorage is present', async () => {
132+
it('fall back to in-memory if neither indexedDB or localStorage is present', async () => {
133133
await driver.webDriver.navigate().refresh();
134134
// Simulate browsers that do not support indexedDB or localStorage.
135135
await driver.webDriver.executeScript(

0 commit comments

Comments
 (0)