-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
amazon-cognito-identity-js: Error: Only radix 2, 4, 8, 16, 32 are supported #4430
Comments
The issue is fixed in #4427. Once it is merged should be resolved. |
@ofirm93 Still got this error :(( |
Is there a workaround until #4427 is fixed? Is there a prior version that works? |
Still got this error |
@ebaizel There is a dump way for temp, you can open the |
Hi, I'm new to AWS Cognito and I'm having this issue as well. Would this fixed can cover my case also? Here's my policy, I don't even have an email and phone number attributes. Only username, password, and two custom attributes. I did a pre-sign up lamba trigger to autoConfirm the user. Then when I tested my Cognito sign in lambda, these are the wrong credential combinations that I tried when the error occurs.
|
Fixed in #4427. Release on |
@julamb @allencart We merged down fixes with #4520 and released it a few days later via 2.2.1. This issue should be resolved, but if you update to |
I solved it by chasing the mail in lowercase letters and using a trim. and in the same way when reading the email that the user enters when they log in. It caused me the error if the user wrote it, it was case sensitive |
on getting this error when trying to authenticate using email of user that does not exist in user pool UPD: will check if updating to latest versions will fix the issue.. |
Hi everyone. I starting getting this error when authenticating any user on my userpool, it started showing up all of a sudden. Has updating to the latest version worked for anybody here? |
This is occurring on Pulling off Auth from |
I have tracked this down to an issue with Cognito returning a bad value for SALT which is for some reason preceded with a minus sign for some email addresses and not others. I have raised a support ticket with AWS, but in the meantime would it be possible to handle this in Amplify by cleaning the SALT value? Assuming that would be quicker than waiting for a Cognito bug fix?
|
Hey @ELRuncho, I updated from If anybody comes across this & is importing the entire |
Yep, that did the trick for me |
I'm receiving the same error message: "Only radix 2, 4, 8, 16, 32 are supported". It gets shown for usernames (emails) that are not registered / not in cognito user pool. |
I have the same issue |
@katerinaonair If you've updated your |
Resolved with "Legacy", many thanks to @zcmgyu |
Thanks for the update @katerinaonair! |
Hi @katerinaonair , just came here to remind you that switching to "Legacy" isn't the best option other than bumping the lib to the latest version which fixes the issue. |
@PaulBurridge-kcom, in your comment, you said you raised a support ticket with AWS. Did they ever get back to you about whether the negative salt value is actually correct? |
@paulie4 AWS Support said they had fixed this in Amplify, basically they altered Amplify to work around the Coignito bug without acknowledging (or fixing) the bug in Cognito. |
Yeah, the negative salt value definitely seems like a bug, and it looks like the code in this project is just working by luck. |
This issue has been automatically locked since there hasn't been any recent activity after it was closed. Please open a new issue for related bugs. Looking for a help forum? We recommend joining the Amplify Community Discord server |
I am using
amazon-cognito-identity-js
(v 3.2.0).My Cognito UserPool is set up to allow users to connect with a verified email address. Logging-in with a username or a verified email address works fine. However, when I try to log in with an unverified email address, I get the following error in the console. This happens whether or not the entered password is correct.
In the network tab, the corresponding call has the
x-amz-target: AWSCognitoIdentityProviderService.InitiateAuth
header, and the response is a json withChallengeName: "PASSWORD_VERIFIER"
and aChallengeParameters
object. I would share it here but I'm not sure if it contains sensitive information.I'd be happy to provide more information if needed.
Edit
One thing that looks odd about the ChallengeParameters object, the salt seems to be a negative hex:
SALT: "-55d8411fb9c566437988f9dca451e61d"
.The text was updated successfully, but these errors were encountered: