@@ -169,7 +169,7 @@ func (api *API) postConvertLoginType(rw http.ResponseWriter, r *http.Request) {
169
169
170
170
//nolint:gocritic // We need to read the system signing key
171
171
// in order to sign the token.
172
- token , err := jwtutils .Sign (dbauthz . AsKeyReader ( ctx ) , api .OIDCConvertKeyCache , claims )
172
+ token , err := jwtutils .Sign (ctx , api .OIDCConvertKeyCache , claims )
173
173
if err != nil {
174
174
httpapi .Write (ctx , rw , http .StatusInternalServerError , codersdk.Response {
175
175
Message : "Internal error signing state jwt." ,
@@ -1681,7 +1681,7 @@ func (api *API) convertUserToOauth(ctx context.Context, r *http.Request, db data
1681
1681
1682
1682
//nolint:gocritic // We need to read the system signing key
1683
1683
// in order to verify the token.
1684
- err = jwtutils .Verify (dbauthz . AsKeyReader ( ctx ) , api .OIDCConvertKeyCache , jwtCookie .Value , & claims )
1684
+ err = jwtutils .Verify (ctx , api .OIDCConvertKeyCache , jwtCookie .Value , & claims )
1685
1685
if xerrors .Is (err , cryptokeys .ErrKeyNotFound ) || xerrors .Is (err , cryptokeys .ErrKeyInvalid ) || xerrors .Is (err , jose .ErrCryptoFailure ) {
1686
1686
// These errors are probably because the user is mixing 2 coder deployments.
1687
1687
return database.User {}, idpsync.HTTPError {
0 commit comments