Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cognito User Pool password length error message should display user pool password length requirement #2370

Closed
BillBunting opened this issue Feb 25, 2021 · 2 comments
Assignees
Labels
feature-request Request a new feature good first issue Good for newcomers mobile client Issues with AWS Mobile's client-side Cognito wrapper

Comments

@BillBunting
Copy link
Contributor

BillBunting commented Feb 25, 2021

Which AWS Services is the feature request for?
Cognito User Pools with AWSMobileClient DropIn UI

Is your feature request related to a problem? Please describe.
Users have reported difficulty signing up for our app because they receive inaccurate or insufficient feedback from the DropIn UI sign up screen regarding password length requirements.

  • Upon entering a 5 character password or less, the UI returns the error: "Sign up failed. Password should have 6 or more characters." However, the User Pool minimum password length is set to 8. Users are incorrectly told the password length is six.
  • Users that enter 6 or 7 character passwords, see a dialog "Sign Up failed. Password did not conform with policy. Password not long enough".

Describe the solution you'd like

  • When a user enters a password less than the User Pool minimum password length, a dialog should inform them of the password length required by the user pool (not be hardcoded to 6)
  • Users should not be told the minimum length is 6 (unless it actually is 6). (remove this validation message)

Here is the code to change:

       if (password.length() < 6) {
            showError(getString(R.string.password_length_validation_failed));
            return;
        }

found at

@s16tom
Copy link

s16tom commented Apr 29, 2021

I've just come across the same thing and it is not only the wording that is inconsistent, which has caused a whole bunch of unexpected issues.

In the case of the 5 character password error, the presignup trigger doesn't run, any code in the trigger is not executed, a (slightly misleading) error is returned to the user and everyone is happy (ish; dodgy error message aside)!

In the case of the 6 or 7 character password error, the presignup trigger runs, gives the lambda code a user ID to execute with... then doesn't create the Cognito user and returns an error to the user. Everyone - especially the user that has a bunch of stuff provisioned for her and more so the admin that has to deal with their support call - is sad!

I'm guessing that the intended behaviour is that the triggers runs and that this code is blocking calls to the API, so the policy is never evaluated. Either way, it would be nice if it were consistent!

@rjuliano rjuliano added good first issue Good for newcomers mobile client Issues with AWS Mobile's client-side Cognito wrapper labels Aug 19, 2021
@gpanshu gpanshu self-assigned this Jan 28, 2022
@gpanshu gpanshu added the feature-request Request a new feature label Feb 10, 2022
@div5yesh div5yesh linked a pull request Feb 18, 2022 that will close this issue
@BillBunting
Copy link
Contributor Author

Grooming my open issues: I removed the ability for new users of my app to create username/password accounts due to a few unresolved AWS UX experience issues (I received support requests/negative reviews from frustrated users dealing with the sign-up experience). Existing users may still sign-in with username/password, but all new users will sign-up with Facebook or Google.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature-request Request a new feature good first issue Good for newcomers mobile client Issues with AWS Mobile's client-side Cognito wrapper
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants