Removal of app.settings.jwt_secret from the database #30606
staaldraad
announced in
Changelog
Replies: 1 comment 1 reply
-
@staaldraad While it seems like right now we can still access the secret, the announced date (2024/11/22) is zero notice. I'm with PowerSync, and we currently rely on Is it possible to delay this change until a asymmetric keys have been rolled out, and users had a chance to switch over? As is, this change will break a couple hundred PowerSync projects integrated with Supabase. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Introduction
We are removing
app.settings.jwt_secret
from thepostgres
database on 2024/11/22.This setting has previously been available through our PostgREST integration, and could be accessed using
current_setting('app.settings.jwt_secret')
in SQL.Why are we doing this?
The
jwt_secret
can be used to mint new, custom JWTs and is security sensitive. Supabase limits access to thejwt_secret
, through both the dashboard and API, to specific roles (owner, admin and developer). Allowing access to this setting directly in the database can allow bypassing of these restrictions.What do you need to do?
If you need the
jwt_secret
, it can be retrieved through the Supabase dashboard.If you are using the
app.settings.jwt_secret
in SQL, you will need to update your function to retrieve this value from Vault.Also, please consult the changelog entry for Asymmetric Keys to understand the coming changes to
jwt_secret
and how keys at Supabase are changing.Beta Was this translation helpful? Give feedback.
All reactions