From c8e3ffd3e6c130d1739e367f453673fffd5dccea Mon Sep 17 00:00:00 2001 From: 7ttp <117663341+7ttp@users.noreply.github.com> Date: Sat, 24 Jan 2026 01:34:34 +0530 Subject: [PATCH] fix: use fixed expiry for asymmetric JWT generation to ensure consistent keys --- pkg/config/apikeys.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkg/config/apikeys.go b/pkg/config/apikeys.go index 12ecb2076..3803b0ed7 100644 --- a/pkg/config/apikeys.go +++ b/pkg/config/apikeys.go @@ -75,7 +75,7 @@ func (a *auth) generateAPIKeys() error { func (a auth) generateJWT(role string) (string, error) { claims := CustomClaims{Issuer: "supabase-demo", Role: role} if len(a.SigningKeys) > 0 { - claims.ExpiresAt = jwt.NewNumericDate(time.Now().Add(time.Hour * 24 * 365 * 10)) // 10 years + claims.ExpiresAt = jwt.NewNumericDate(time.Unix(defaultJwtExpiry, 0)) return GenerateAsymmetricJWT(a.SigningKeys[0], claims) } // Fallback to generating symmetric keys