diff --git a/Gopkg.lock b/Gopkg.lock index 8b0340d0..344c7265 100644 --- a/Gopkg.lock +++ b/Gopkg.lock @@ -276,8 +276,8 @@ revision = "de77670473b5492f5d0bce155b5c01534c2d13f7" [[projects]] - branch = "master" - digest = "1:8b36444f30009b5e124a3ac48b353558024a95c3fccdf3e6bb557a091e67342b" + branch = "update-go-jose" + digest = "1:253eec7c89c6fe08ae020877b0b44343e86da68dac99207280e7ddcacd441f1f" name = "github.com/smallstep/cli" packages = [ "command", @@ -298,7 +298,7 @@ "utils", ] pruneopts = "UT" - revision = "3e1e2dcfa54298e0fb86e0be86ab36d79f36473e" + revision = "b0dd6172f37a12153084edbd170ae95dd35ef9a8" [[projects]] branch = "master" @@ -460,7 +460,8 @@ version = "v0.9.1" [[projects]] - digest = "1:7fbe10f3790dc4e6296c7c844c5a9b35513e5521c29c47e10ba99cd2956a2719" + branch = "v2" + digest = "1:9593bab40e981b1f90b7e07faeab0d09b75fe338880d08880f986a9d3283c53f" name = "gopkg.in/square/go-jose.v2" packages = [ ".", @@ -469,8 +470,8 @@ "jwt", ] pruneopts = "UT" - revision = "ef984e69dd356202fd4e4910d4d9c24468bdf0b8" - version = "v2.1.9" + revision = "fd0b35a2f1ec103c6bb76cc6d4b8077fa5844fb2" + source = "github.com/maraino/go-jose" [[projects]] digest = "1:342378ac4dcb378a5448dd723f0784ae519383532f5e70ade24132c4c8693202" diff --git a/Gopkg.toml b/Gopkg.toml index 0e564d1f..56a09ec8 100644 --- a/Gopkg.toml +++ b/Gopkg.toml @@ -45,7 +45,7 @@ required = [ name = "github.com/go-chi/chi" [[override]] - branch = "master" + branch = "update-go-jose" name = "github.com/smallstep/cli" [prune] @@ -62,4 +62,7 @@ required = [ [[constraint]] name = "gopkg.in/square/go-jose.v2" - version = "2.1.9" + # version = "2.3.0" + # Using special branch with ed25519 fix + source = "github.com/maraino/go-jose" + branch = "v2" \ No newline at end of file diff --git a/authority/authorize.go b/authority/authorize.go index d0d04121..de272086 100644 --- a/authority/authorize.go +++ b/authority/authorize.go @@ -47,7 +47,7 @@ func (a *Authority) Authorize(ott string) ([]provisioner.SignOption, error) { // Do not accept tokens issued before the start of the ca. // This check is meant as a stopgap solution to the current lack of a persistence layer. if a.config.AuthorityConfig != nil && !a.config.AuthorityConfig.DisableIssuedAtCheck { - if claims.IssuedAt > 0 && claims.IssuedAt.Time().Before(a.startTime) { + if claims.IssuedAt != nil && claims.IssuedAt.Time().Before(a.startTime) { return nil, &apiError{errors.New("authorize: token issued before the bootstrap of certificate authority"), http.StatusUnauthorized, errContext} }