Skip to content

Conversation

@claudiamurialdo
Copy link
Collaborator

@claudiamurialdo claudiamurialdo commented Jun 13, 2025

Added logic to handle large SDT values in JWT tokens. If the serialized SDT exceeds a predefined size limit, its SHA256 hash is stored in the token instead of the full value. This ensures token size remains manageable while maintaining data integrity for verification
Issue:204823

…ed SDT exceeds a predefined size limit, its SHA256 hash is stored in the token instead of the full value. This ensures token size remains manageable while maintaining data integrity for verification
@claudiamurialdo claudiamurialdo had a problem deploying to kafka-integration-tests June 13, 2025 21:32 — with GitHub Actions Failure
@claudiamurialdo claudiamurialdo had a problem deploying to external-storage-tests June 13, 2025 21:32 — with GitHub Actions Failure
@claudiamurialdo claudiamurialdo marked this pull request as ready for review June 16, 2025 12:57
@genexusbot
Copy link
Collaborator

Cherry pick to beta success

fedeazzato
fedeazzato previously approved these changes Jun 16, 2025
Copy link
Member

@fedeazzato fedeazzato left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM 👍

@genexusbot
Copy link
Collaborator

Cherry pick to beta success

@claudiamurialdo claudiamurialdo temporarily deployed to external-storage-tests August 1, 2025 19:12 — with GitHub Actions Inactive
@claudiamurialdo claudiamurialdo temporarily deployed to kafka-integration-tests August 1, 2025 19:13 — with GitHub Actions Inactive
@genexusbot
Copy link
Collaborator

Cherry pick to beta success

@claudiamurialdo claudiamurialdo merged commit a9e092e into master Nov 18, 2025
9 of 10 checks passed
@claudiamurialdo claudiamurialdo deleted the fix/sdt-jwt-token-size branch November 18, 2025 15:07
claudiamurialdo added a commit that referenced this pull request Nov 18, 2025
* Added logic to handle large SDT values in JWT tokens. If the serialized SDT exceeds a predefined size limit, its SHA256 hash is stored in the token instead of the full value. This ensures token size remains manageable while maintaining data integrity for verification

* Trim trailing zeroes from decimal values during JSON serialization.

* decimal.Parse must specify the culture to read the right decimal number

(cherry picked from commit a9e092e)
claudiamurialdo added a commit that referenced this pull request Nov 18, 2025
* Added logic to handle large SDT values in JWT tokens. If the serialized SDT exceeds a predefined size limit, its SHA256 hash is stored in the token instead of the full value. This ensures token size remains manageable while maintaining data integrity for verification

* Trim trailing zeroes from decimal values during JSON serialization.

* decimal.Parse must specify the culture to read the right decimal number

(cherry picked from commit a9e092e)
(cherry picked from commit 4b82408)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants