Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handle escaped datetime conversion. #1975

Merged
merged 1 commit into from
Nov 30, 2022
Merged

Handle escaped datetime conversion. #1975

merged 1 commit into from
Nov 30, 2022

Conversation

brentschmaltz
Copy link
Member

.net 6.0 can throw IndexOutOfRangeException exceptions when calling TryGetDateTime.
In this case, catch the exception and return the claim as a string.

Copy link
Contributor

@TimHannMSFT TimHannMSFT left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@brentschmaltz brentschmaltz merged commit 9ddad8f into dev Nov 30, 2022
@brentschmaltz brentschmaltz deleted the brentsch/datetime branch December 1, 2022 05:25
renovate bot referenced this pull request in orso-co/Orso.Arpa.Api Dec 4, 2022
[![Mend
Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com)

This PR contains the following updates:

| Package | Type | Update | Change |
|---|---|---|---|
|
[System.IdentityModel.Tokens.Jwt](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet)
| nuget | patch | `6.25.0` -> `6.25.1` |

---

### Release Notes

<details>

<summary>AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet</summary>

###
[`v6.25.1`](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/releases/tag/6.25.1)

[Compare
Source](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/compare/6.25.0...6.25.1)

Servicing release
.net was throwing when JWT tokens contained claims that used escaped
characters.

[https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/pull/1975](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/pull/1975)
Fixed Typo in comments

[https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/pull/1971](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/pull/1971)
Added inner exception to help diagnose when reading JWT tokens fails.

[https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/pull/1968](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/pull/1968)
Updated comments to improve understanding of RoleClaimTypeRetriever and
NameClaimTypeRetriever

[https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/pull/1960](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/pull/1960)

</details>

---

### Configuration

📅 **Schedule**: Branch creation - "after 10pm every weekday,every
weekend,before 5am every weekday" in timezone Europe/Berlin, Automerge -
At any time (no schedule defined).

🚦 **Automerge**: Enabled.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the
rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update
again.

---

- [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check
this box

---

This PR has been generated by [Mend
Renovate](https://www.mend.io/free-developer-tools/renovate/). View
repository job log
[here](https://app.renovatebot.com/dashboard#github/orso-co/Orso.Arpa.Api).

<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNC40OC4xIiwidXBkYXRlZEluVmVyIjoiMzQuNDguMSJ9-->

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants