Skip to content

Conversation

@kallebysantos
Copy link
Member

@kallebysantos kallebysantos commented Jan 14, 2026

What kind of change does this PR introduce?

Bug fix, feature

What is the current behavior?

Since API keys did change, users can't call functions without manually disabling verify_jwt.

What is the new behavior?

JWKs are now default exposed #4688, so It allows to verify both new asymmetric tokens as well legacy ones.

This way it applies a temporary fix while migrating API keys.

Allows verify new JWTs as well legacy
@kallebysantos kallebysantos requested a review from a team as a code owner January 14, 2026 11:38
@coveralls
Copy link

Pull Request Test Coverage Report for Build 20992742862

Details

  • 0 of 0 changed or added relevant lines in 0 files are covered.
  • 7 unchanged lines in 2 files lost coverage.
  • Overall coverage remained the same at 56.148%

Files with Coverage Reduction New Missed Lines %
internal/storage/rm/rm.go 2 80.61%
internal/gen/keys/keys.go 5 12.9%
Totals Coverage Status
Change from base Build 20983346857: 0.0%
Covered Lines: 6850
Relevant Lines: 12200

💛 - Coveralls

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

JWT key verification broken (Edge Runtime 1.7.0+) for self-hosted deployments

2 participants