diff --git a/server/ente/passkey.go b/server/ente/passkey.go index 203fb5982..edeb99fd5 100644 --- a/server/ente/passkey.go +++ b/server/ente/passkey.go @@ -14,7 +14,7 @@ type Passkey struct { var MaxPasskeys = 10 type SetPasskeyRecoveryRequest struct { - Secret uuid.UUID `json:"secret" binding:"required"` + Secret string `json:"secret" binding:"required"` // The UserSecretCipher has SkipSecret encrypted with the user's recoveryKey // If the user sends the correct UserSecretCipher, we can be sure that the user has the recoveryKey, // and we can allow the user to recover their MFA. diff --git a/server/pkg/repo/two_factor_recovery/repository.go b/server/pkg/repo/two_factor_recovery/repository.go index 0720c0823..4bc63fdd5 100644 --- a/server/pkg/repo/two_factor_recovery/repository.go +++ b/server/pkg/repo/two_factor_recovery/repository.go @@ -35,7 +35,7 @@ func (r *Repository) GetStatus(userID int64) (*ente.TwoFactorRecoveryStatus, err } func (r *Repository) SetPasskeyRecovery(ctx context.Context, userID int64, req *ente.SetPasskeyRecoveryRequest) error { - serveEncPasskey, encErr := crypto.Encrypt(req.Secret.String(), r.SecretEncryptionKey) + serveEncPasskey, encErr := crypto.Encrypt(req.Secret, r.SecretEncryptionKey) if encErr != nil { return stacktrace.Propagate(encErr, "failed to encrypt passkey secret") }