diff --git a/Cargo.toml b/Cargo.toml index 0963749..f84ec68 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -30,7 +30,7 @@ reqwest = { version = "0.12.5", features = ["rustls-tls"] } serde = "1.0.188" serde_json = "1.0.107" serde_urlencoded = "0.7.1" -ssi = { version = "0.10", features = ["secp256r1"] } +ssi = { version = "0.10.1", features = ["secp256r1"] } tokio = "1.32.0" tracing = "0.1.37" url = { version = "2.4.1", features = ["serde"] } diff --git a/src/core/authorization_request/verification/did.rs b/src/core/authorization_request/verification/did.rs index 0bc0928..cd69956 100644 --- a/src/core/authorization_request/verification/did.rs +++ b/src/core/authorization_request/verification/did.rs @@ -40,12 +40,6 @@ pub async fn verify_with_resolver( bail!("request was signed with unsupported algorithm: {alg}") } - // This bypass is for unencoded JWT requests, but we will need to change this later - // so that trust is preserved when receiving unencoded requests - if alg.contains("none") { - return Ok(()); - } - let Json::String(kid) = headers .remove("kid") .context("'kid' was missing from jwt headers")?