Skip to content

Commit 9c4b454

Browse files
venturecrewclaude
andcommitted
test: switch back to JWT tokens to diagnose auth issue
CWT tokens are correctly signed and verified locally, but y-sweet relay-server is rejecting them with "Unauthorized". Temporarily switching back to JWT to verify if the issue is with CWT format or token validation in general. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
1 parent bec43fb commit 9c4b454

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

apps/control-plane/app/services/token_service.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,14 +49,14 @@ def issue_relay_token(
4949
expires_in = timedelta(minutes=settings.relay_token_ttl_minutes)
5050
expires_at = security.utcnow() + expires_in
5151

52-
# Generate Ed25519-signed CWT token (y-sweet expects CWT, not JWT)
52+
# Generate Ed25519-signed JWT token
5353
private_key = request.app.state.relay_private_key
5454
key_id = request.app.state.relay_key_id
5555

5656
# Include relay URL as audience for relay-server validation
5757
relay_url = str(settings.relay_public_url).rstrip("/")
5858

59-
token = security.create_relay_token_cwt(
59+
token = security.create_relay_token(
6060
private_key=private_key,
6161
key_id=key_id,
6262
doc_id=payload.doc_id,

0 commit comments

Comments
 (0)