Skip to content

Commit c8e3ffd

Browse files
committed
fix: use fixed expiry for asymmetric JWT generation to ensure consistent keys
1 parent cd3226b commit c8e3ffd

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

pkg/config/apikeys.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ func (a *auth) generateAPIKeys() error {
7575
func (a auth) generateJWT(role string) (string, error) {
7676
claims := CustomClaims{Issuer: "supabase-demo", Role: role}
7777
if len(a.SigningKeys) > 0 {
78-
claims.ExpiresAt = jwt.NewNumericDate(time.Now().Add(time.Hour * 24 * 365 * 10)) // 10 years
78+
claims.ExpiresAt = jwt.NewNumericDate(time.Unix(defaultJwtExpiry, 0))
7979
return GenerateAsymmetricJWT(a.SigningKeys[0], claims)
8080
}
8181
// Fallback to generating symmetric keys

0 commit comments

Comments
 (0)