diff --git a/libs/common/src/platform/services/fido2/fido2-authenticator.service.ts b/libs/common/src/platform/services/fido2/fido2-authenticator.service.ts index 86f563b7c91..cc7f897687e 100644 --- a/libs/common/src/platform/services/fido2/fido2-authenticator.service.ts +++ b/libs/common/src/platform/services/fido2/fido2-authenticator.service.ts @@ -132,7 +132,7 @@ export class Fido2AuthenticatorService userVerification: params.requireUserVerification, rpId: params.rpEntity.id, }); - console.log("rpid", params.rpEntity.id, response.cipherId); + const cipherId = response.cipherId; userVerified = response.userVerified; @@ -147,7 +147,7 @@ export class Fido2AuthenticatorService keyPair = await createKeyPair(); pubKeyDer = await crypto.subtle.exportKey("spki", keyPair.publicKey); const encrypted = await this.cipherService.get(cipherId); - console.log("Encrypted", encrypted); + const activeUserId = await firstValueFrom( this.accountService.activeAccount$.pipe(map((a) => a?.id)), ); @@ -155,7 +155,6 @@ export class Fido2AuthenticatorService cipher = await encrypted.decrypt( await this.cipherService.getKeyForCipherKeyDecryption(encrypted, activeUserId), ); - if ( !userVerified && @@ -177,15 +176,12 @@ export class Fido2AuthenticatorService await this.cipherService.updateWithServer(reencrypted); await this.cipherService.clearCache(activeUserId); credentialId = fido2Credential.credentialId; - console.log("rpid", params.rpEntity.id); - } catch (error) { this.logService?.error( `[Fido2Authenticator] Aborting because of unknown error when creating credential: ${error}`, ); throw new Fido2AuthenticatorError(Fido2AuthenticatorErrorCode.Unknown); } - console.log("authdata rpid", params.rpEntity.id); const authData = await generateAuthData({ rpId: params.rpEntity.id, credentialId: parseCredentialId(credentialId),