Skip to content

Configure GeneratePackageVersions to support a "cooldown" on dependencies#8371

Merged
bouwkast merged 9 commits intomasterfrom
steven/package-version-release-date-support
Apr 1, 2026
Merged

Configure GeneratePackageVersions to support a "cooldown" on dependencies#8371
bouwkast merged 9 commits intomasterfrom
steven/package-version-release-date-support

Conversation

@bouwkast
Copy link
Copy Markdown
Collaborator

@bouwkast bouwkast commented Mar 25, 2026

Summary of changes

default cooldown period is 2 days

Adds a configurable cooldown period to the GeneratePackageVersions to support remediation efforts for follow up after #incident-51602.

To use supply the optional parameter --PackageVersionCooldownDays X where X is some number of days. The current period is at the moment is going to be 2 days and is the default now when the overall GeneratePackageVersion target is ran. Additionally, this is overridden to 0 if --IncludePackages is supplied (this is commonly used when working on a singular package locally).

After running the tool a "cooldown" report is generated, this file will contain packages that we see have a newer version, but will not incorporate into the test, the fallback version that falls within the cooldown period is provided. This file content will show up in the output of future test package version bump PRs.

Note that this is for automated updates, so if it sees something already updated it will honor it.

Here's an example output ran locally with 14 days set:

## Package Version Cooldown Report

The following versions were published less than **14 days** ago and have been overridden.
These require manual review before inclusion.

| Package | Integration | Overridden Version | Published | Age (days) | Using Instead |
|---------|-------------|--------------------|-----------|------------|---------------|
| AWSSDK.Core | AwsSdk | 4.0.3.22 | 2026-03-25 | 0 | 4.0.3.21 |
| AWSSDK.S3 | AwsS3 | 4.0.19.2 | 2026-03-25 | 0 | 4.0.19.1 |
| StackExchange.Redis | StackExchangeRedis | 2.12.8 | 2026-03-25 | 0 | 2.12.4 |

Reason for change

In #8364 and #incident-51602 all automated dependency updaters to be disabled temporarily, to re-enable we need to supply a 2 day "cooldown" to any version that we update to (in other words the version of the NuGet must be published for at least 2 days before we can update to it).

Implementation details

I made Claude do this 🤖

  • NuGetPackageHelper now captures the Published date from IPackageSearchMetadata via a new VersionWithDate record (previously discarded)
  • NuGetVersionCache stores the new {Version, Published} format
  • PackageVersionGenerator.ApplyCooldown filters selected versions after LatestMajors/LatestMinors/LatestSpecific selection:
    • Versions outside the cooldown window pass through unchanged
    • Versions at or below the baseline (derived from supported_versions.json MaxVersionTestedInclusive) are kept even if
      within cooldown -- no downgrades
    • Versions above the baseline and within cooldown are overridden to the best available fallback
  • CooldownReport collects overridden versions and renders a markdown table saved to tracer/build/cooldown_report.md
  • The GitHub Actions workflow reads the report and appends it to the auto-bump PR body
  • Honeypot IntegrationGroups.cs fixes: MSTest.TestFramework now maps to itself, Hangfire.Core maps to Hangfire.Core (was Hangfire), OpenFeature mapping moved to Datadog.FeatureFlags.OpenFeature

Passing --IncludePackages will override the cooldown to 0

Test coverage

I ran GeneratePackageVersions --PackageVersionCooldownDays 14 locally seems good enough IMO (also ran without, with different days etc)

[WRN] GeneratePackageVersi: 3 package version(s) were excluded due to the 14-day cooldown period
[WRN] GeneratePackageVersi:   AWSSDK.Core 4.0.3.22 overridden (published 2026-03-25, using: 4.0.3.21)
[WRN] GeneratePackageVersi:   AWSSDK.S3 4.0.19.2 overridden (published 2026-03-25, using: 4.0.19.1)
[WRN] GeneratePackageVersi:   StackExchange.Redis 2.12.8 overridden (published 2026-03-25, using: 2.12.4)

Other details

The workflow file (auto_bump_test_package_versions.yml) will be re-enabled with this PR

@bouwkast bouwkast added the AI Generated Largely based on code generated by an AI or LLM. This label is the same across all dd-trace-* repos label Mar 25, 2026
@pr-commenter
Copy link
Copy Markdown

pr-commenter Bot commented Mar 25, 2026

Benchmarks

Benchmark execution time: 2026-03-30 20:19:33

Comparing candidate commit 580786b in PR branch steven/package-version-release-date-support with baseline commit f51d779 in branch master.

Found 3 performance improvements and 11 performance regressions! Performance is the same for 257 metrics, 17 unstable metrics.

Explanation

This is an A/B test comparing a candidate commit's performance against that of a baseline commit. Performance changes are noted in the tables below as:

  • 🟩 = significantly better candidate vs. baseline
  • 🟥 = significantly worse candidate vs. baseline

We compute a confidence interval (CI) over the relative difference of means between metrics from the candidate and baseline commits, considering the baseline as the reference.

If the CI is entirely outside the configured SIGNIFICANT_IMPACT_THRESHOLD (or the deprecated UNCONFIDENCE_THRESHOLD), the change is considered significant.

Feel free to reach out to #apm-benchmarking-platform on Slack if you have any questions.

More details about the CI and significant changes

You can imagine this CI as a range of values that is likely to contain the true difference of means between the candidate and baseline commits.

CIs of the difference of means are often centered around 0%, because often changes are not that big:

---------------------------------(------|---^--------)-------------------------------->
                              -0.6%    0%  0.3%     +1.2%
                                 |          |        |
         lower bound of the CI --'          |        |
sample mean (center of the CI) -------------'        |
         upper bound of the CI ----------------------'

As described above, a change is considered significant if the CI is entirely outside the configured SIGNIFICANT_IMPACT_THRESHOLD (or the deprecated UNCONFIDENCE_THRESHOLD).

For instance, for an execution time metric, this confidence interval indicates a significantly worse performance:

----------------------------------------|---------|---(---------^---------)---------->
                                       0%        1%  1.3%      2.2%      3.1%
                                                  |   |         |         |
       significant impact threshold --------------'   |         |         |
                      lower bound of CI --------------'         |         |
       sample mean (center of the CI) --------------------------'         |
                      upper bound of CI ----------------------------------'

scenario:Benchmarks.Trace.AgentWriterBenchmark.WriteAndFlushEnrichedTraces netcoreapp3.1

  • 🟥 execution_time [+90.602ms; +90.846ms] or [+81.970%; +82.192%]

scenario:Benchmarks.Trace.Asm.AppSecBodyBenchmark.AllCycleMoreComplexBody net472

  • 🟩 throughput [+8516.430op/s; +8897.049op/s] or [+7.003%; +7.316%]

scenario:Benchmarks.Trace.Asm.AppSecBodyBenchmark.AllCycleMoreComplexBody net6.0

  • 🟥 execution_time [+10.556ms; +15.240ms] or [+5.260%; +7.595%]

scenario:Benchmarks.Trace.Asm.AppSecBodyBenchmark.AllCycleSimpleBody netcoreapp3.1

  • 🟥 execution_time [+15.202ms; +21.191ms] or [+7.878%; +10.982%]

scenario:Benchmarks.Trace.Asm.AppSecBodyBenchmark.ObjectExtractorMoreComplexBody net6.0

  • 🟥 execution_time [+9.960ms; +15.876ms] or [+5.062%; +8.069%]

scenario:Benchmarks.Trace.Asm.AppSecEncoderBenchmark.EncodeLegacyArgs netcoreapp3.1

  • 🟥 execution_time [+20.215ms; +20.747ms] or [+11.189%; +11.484%]

scenario:Benchmarks.Trace.AspNetCoreBenchmark.SendRequest net6.0

  • 🟥 execution_time [+4.989ms; +7.119ms] or [+5.813%; +8.295%]

scenario:Benchmarks.Trace.CIVisibilityProtocolWriterBenchmark.WriteAndFlushEnrichedTraces net6.0

  • 🟩 execution_time [-39.159ms; -34.521ms] or [-18.142%; -15.993%]

scenario:Benchmarks.Trace.CharSliceBenchmark.OriginalCharSlice net6.0

  • 🟥 execution_time [+121.533µs; +128.307µs] or [+6.353%; +6.707%]
  • 🟥 throughput [-32.879op/s; -31.193op/s] or [-6.290%; -5.968%]

scenario:Benchmarks.Trace.Iast.StringAspectsBenchmark.StringConcatAspectBenchmark net6.0

  • 🟥 allocated_mem [+17.286KB; +17.322KB] or [+6.702%; +6.716%]

scenario:Benchmarks.Trace.Log4netBenchmark.EnrichedLog netcoreapp3.1

  • 🟥 execution_time [+40.576ms; +43.796ms] or [+25.261%; +27.265%]

scenario:Benchmarks.Trace.SingleSpanAspNetCoreBenchmark.SingleSpanAspNetCore netcoreapp3.1

  • 🟥 throughput [-15785431.426op/s; -14418966.789op/s] or [-6.556%; -5.988%]

scenario:Benchmarks.Trace.SpanBenchmark.StartFinishTwoScopes net6.0

  • 🟩 execution_time [-20.041ms; -14.730ms] or [-9.264%; -6.809%]

@dd-trace-dotnet-ci-bot
Copy link
Copy Markdown

dd-trace-dotnet-ci-bot Bot commented Mar 25, 2026

Execution-Time Benchmarks Report ⏱️

Execution-time results for samples comparing This PR (8371) and master.

⚠️ Potential regressions detected

FakeDbCommand

Metric Master (Mean ± 95% CI) Current (Mean ± 95% CI) Change Status
.NET Framework 4.8 - Baseline
duration71.43 ± (71.50 - 71.78) ms78.53 ± (78.56 - 79.44) ms+9.9%❌⬆️
.NET Framework 4.8 - Bailout
duration76.02 ± (75.97 - 76.33) ms95.43 ± (95.36 - 96.03) ms+25.5%❌⬆️

HttpMessageHandler

Metric Master (Mean ± 95% CI) Current (Mean ± 95% CI) Change Status
.NET Framework 4.8 - Baseline
duration193.20 ± (193.07 - 194.03) ms211.06 ± (210.99 - 212.10) ms+9.2%❌⬆️
.NET Framework 4.8 - Bailout
duration197.04 ± (197.25 - 198.32) ms216.33 ± (215.91 - 216.99) ms+9.8%❌⬆️
.NET Framework 4.8 - CallTarget+Inlining+NGEN
duration1165.14 ± (1172.42 - 1183.27) ms1244.33 ± (1242.40 - 1250.32) ms+6.8%❌⬆️
Full Metrics Comparison

FakeDbCommand

Metric Master (Mean ± 95% CI) Current (Mean ± 95% CI) Change Status
.NET Framework 4.8 - Baseline
duration71.43 ± (71.50 - 71.78) ms78.53 ± (78.56 - 79.44) ms+9.9%❌⬆️
.NET Framework 4.8 - Bailout
duration76.02 ± (75.97 - 76.33) ms95.43 ± (95.36 - 96.03) ms+25.5%❌⬆️
.NET Framework 4.8 - CallTarget+Inlining+NGEN
duration1071.89 ± (1072.00 - 1078.73) ms1089.61 ± (1097.47 - 1111.19) ms+1.7%✅⬆️
.NET Core 3.1 - Baseline
process.internal_duration_ms22.35 ± (22.30 - 22.40) ms22.41 ± (22.37 - 22.45) ms+0.3%✅⬆️
process.time_to_main_ms83.67 ± (83.50 - 83.84) ms83.67 ± (83.48 - 83.86) ms+0.0%✅⬆️
runtime.dotnet.exceptions.count0 ± (0 - 0)0 ± (0 - 0)+0.0%
runtime.dotnet.mem.committed10.90 ± (10.90 - 10.91) MB10.92 ± (10.92 - 10.93) MB+0.2%✅⬆️
runtime.dotnet.threads.count12 ± (12 - 12)12 ± (12 - 12)+0.0%
.NET Core 3.1 - Bailout
process.internal_duration_ms22.22 ± (22.18 - 22.25) ms22.37 ± (22.33 - 22.40) ms+0.7%✅⬆️
process.time_to_main_ms85.11 ± (84.95 - 85.28) ms85.34 ± (85.13 - 85.56) ms+0.3%✅⬆️
runtime.dotnet.exceptions.count0 ± (0 - 0)0 ± (0 - 0)+0.0%
runtime.dotnet.mem.committed10.95 ± (10.94 - 10.95) MB10.95 ± (10.94 - 10.95) MB+0.0%✅⬆️
runtime.dotnet.threads.count13 ± (13 - 13)13 ± (13 - 13)+0.0%
.NET Core 3.1 - CallTarget+Inlining+NGEN
process.internal_duration_ms223.16 ± (221.99 - 224.32) ms223.50 ± (222.24 - 224.76) ms+0.2%✅⬆️
process.time_to_main_ms532.05 ± (530.99 - 533.11) ms531.97 ± (530.70 - 533.24) ms-0.0%
runtime.dotnet.exceptions.count0 ± (0 - 0)0 ± (0 - 0)+0.0%
runtime.dotnet.mem.committed48.24 ± (48.20 - 48.27) MB48.31 ± (48.28 - 48.34) MB+0.2%✅⬆️
runtime.dotnet.threads.count28 ± (28 - 28)28 ± (28 - 28)+0.3%✅⬆️
.NET 6 - Baseline
process.internal_duration_ms20.94 ± (20.91 - 20.97) ms21.07 ± (21.04 - 21.10) ms+0.6%✅⬆️
process.time_to_main_ms71.92 ± (71.77 - 72.08) ms72.40 ± (72.22 - 72.58) ms+0.7%✅⬆️
runtime.dotnet.exceptions.count0 ± (0 - 0)0 ± (0 - 0)+0.0%
runtime.dotnet.mem.committed10.62 ± (10.62 - 10.62) MB10.65 ± (10.65 - 10.65) MB+0.3%✅⬆️
runtime.dotnet.threads.count10 ± (10 - 10)10 ± (10 - 10)+0.0%
.NET 6 - Bailout
process.internal_duration_ms20.92 ± (20.89 - 20.96) ms21.04 ± (21.01 - 21.08) ms+0.6%✅⬆️
process.time_to_main_ms73.13 ± (72.97 - 73.29) ms73.18 ± (73.00 - 73.36) ms+0.1%✅⬆️
runtime.dotnet.exceptions.count0 ± (0 - 0)0 ± (0 - 0)+0.0%
runtime.dotnet.mem.committed10.66 ± (10.66 - 10.67) MB10.76 ± (10.75 - 10.76) MB+0.9%✅⬆️
runtime.dotnet.threads.count11 ± (11 - 11)11 ± (11 - 11)+0.0%
.NET 6 - CallTarget+Inlining+NGEN
process.internal_duration_ms387.20 ± (384.70 - 389.69) ms386.90 ± (384.64 - 389.15) ms-0.1%
process.time_to_main_ms530.58 ± (529.61 - 531.55) ms532.89 ± (531.92 - 533.86) ms+0.4%✅⬆️
runtime.dotnet.exceptions.count0 ± (0 - 0)0 ± (0 - 0)+0.0%
runtime.dotnet.mem.committed50.23 ± (50.21 - 50.26) MB50.32 ± (50.29 - 50.34) MB+0.2%✅⬆️
runtime.dotnet.threads.count28 ± (28 - 28)28 ± (28 - 28)+0.0%✅⬆️
.NET 8 - Baseline
process.internal_duration_ms19.16 ± (19.12 - 19.19) ms19.29 ± (19.26 - 19.32) ms+0.7%✅⬆️
process.time_to_main_ms71.28 ± (71.13 - 71.43) ms71.72 ± (71.56 - 71.87) ms+0.6%✅⬆️
runtime.dotnet.exceptions.count0 ± (0 - 0)0 ± (0 - 0)+0.0%
runtime.dotnet.mem.committed7.69 ± (7.68 - 7.69) MB7.67 ± (7.67 - 7.68) MB-0.1%
runtime.dotnet.threads.count10 ± (10 - 10)10 ± (10 - 10)+0.0%
.NET 8 - Bailout
process.internal_duration_ms19.25 ± (19.21 - 19.28) ms19.40 ± (19.37 - 19.44) ms+0.8%✅⬆️
process.time_to_main_ms72.88 ± (72.74 - 73.02) ms72.87 ± (72.70 - 73.04) ms-0.0%
runtime.dotnet.exceptions.count0 ± (0 - 0)0 ± (0 - 0)+0.0%
runtime.dotnet.mem.committed7.75 ± (7.74 - 7.75) MB7.76 ± (7.75 - 7.77) MB+0.2%✅⬆️
runtime.dotnet.threads.count11 ± (11 - 11)11 ± (11 - 11)+0.0%
.NET 8 - CallTarget+Inlining+NGEN
process.internal_duration_ms308.00 ± (305.65 - 310.34) ms308.44 ± (305.94 - 310.95) ms+0.1%✅⬆️
process.time_to_main_ms490.98 ± (490.24 - 491.72) ms491.59 ± (490.80 - 492.38) ms+0.1%✅⬆️
runtime.dotnet.exceptions.count0 ± (0 - 0)0 ± (0 - 0)+0.0%
runtime.dotnet.mem.committed37.26 ± (37.24 - 37.28) MB37.25 ± (37.23 - 37.27) MB-0.0%
runtime.dotnet.threads.count27 ± (27 - 27)27 ± (27 - 27)-0.2%

HttpMessageHandler

Metric Master (Mean ± 95% CI) Current (Mean ± 95% CI) Change Status
.NET Framework 4.8 - Baseline
duration193.20 ± (193.07 - 194.03) ms211.06 ± (210.99 - 212.10) ms+9.2%❌⬆️
.NET Framework 4.8 - Bailout
duration197.04 ± (197.25 - 198.32) ms216.33 ± (215.91 - 216.99) ms+9.8%❌⬆️
.NET Framework 4.8 - CallTarget+Inlining+NGEN
duration1165.14 ± (1172.42 - 1183.27) ms1244.33 ± (1242.40 - 1250.32) ms+6.8%❌⬆️
.NET Core 3.1 - Baseline
process.internal_duration_ms187.87 ± (187.50 - 188.24) ms208.07 ± (207.54 - 208.61) ms+10.8%✅⬆️
process.time_to_main_ms81.24 ± (80.95 - 81.54) ms90.77 ± (90.47 - 91.06) ms+11.7%✅⬆️
runtime.dotnet.exceptions.count3 ± (3 - 3)3 ± (3 - 3)+0.0%
runtime.dotnet.mem.committed16.11 ± (16.07 - 16.14) MB15.92 ± (15.90 - 15.94) MB-1.2%
runtime.dotnet.threads.count20 ± (19 - 20)20 ± (20 - 20)+2.0%✅⬆️
.NET Core 3.1 - Bailout
process.internal_duration_ms186.53 ± (186.24 - 186.82) ms207.57 ± (206.99 - 208.15) ms+11.3%✅⬆️
process.time_to_main_ms81.95 ± (81.79 - 82.12) ms91.98 ± (91.66 - 92.31) ms+12.2%✅⬆️
runtime.dotnet.exceptions.count3 ± (3 - 3)3 ± (3 - 3)+0.0%
runtime.dotnet.mem.committed16.20 ± (16.17 - 16.24) MB16.03 ± (16.01 - 16.05) MB-1.1%
runtime.dotnet.threads.count21 ± (21 - 21)21 ± (21 - 21)+0.7%✅⬆️
.NET Core 3.1 - CallTarget+Inlining+NGEN
process.internal_duration_ms395.41 ± (394.15 - 396.68) ms422.59 ± (421.25 - 423.93) ms+6.9%✅⬆️
process.time_to_main_ms525.23 ± (524.34 - 526.13) ms570.64 ± (569.21 - 572.08) ms+8.6%✅⬆️
runtime.dotnet.exceptions.count3 ± (3 - 3)3 ± (3 - 3)+0.0%
runtime.dotnet.mem.committed59.05 ± (58.94 - 59.17) MB59.17 ± (59.11 - 59.23) MB+0.2%✅⬆️
runtime.dotnet.threads.count30 ± (30 - 30)30 ± (30 - 30)+0.1%✅⬆️
.NET 6 - Baseline
process.internal_duration_ms192.21 ± (191.88 - 192.55) ms215.25 ± (214.70 - 215.79) ms+12.0%✅⬆️
process.time_to_main_ms70.09 ± (69.91 - 70.26) ms79.94 ± (79.68 - 80.19) ms+14.1%✅⬆️
runtime.dotnet.exceptions.count4 ± (4 - 4)4 ± (4 - 4)+0.0%
runtime.dotnet.mem.committed16.17 ± (16.03 - 16.31) MB16.22 ± (16.20 - 16.24) MB+0.3%✅⬆️
runtime.dotnet.threads.count19 ± (19 - 19)20 ± (19 - 20)+3.4%✅⬆️
.NET 6 - Bailout
process.internal_duration_ms192.26 ± (191.93 - 192.59) ms212.74 ± (212.21 - 213.28) ms+10.7%✅⬆️
process.time_to_main_ms71.05 ± (70.94 - 71.15) ms80.16 ± (79.90 - 80.43) ms+12.8%✅⬆️
runtime.dotnet.exceptions.count4 ± (4 - 4)4 ± (4 - 4)+0.0%
runtime.dotnet.mem.committed16.22 ± (16.09 - 16.35) MB16.28 ± (16.25 - 16.31) MB+0.4%✅⬆️
runtime.dotnet.threads.count19 ± (19 - 20)21 ± (20 - 21)+6.5%✅⬆️
.NET 6 - CallTarget+Inlining+NGEN
process.internal_duration_ms600.34 ± (597.60 - 603.08) ms597.76 ± (594.58 - 600.93) ms-0.4%
process.time_to_main_ms523.80 ± (522.95 - 524.65) ms577.12 ± (575.40 - 578.83) ms+10.2%✅⬆️
runtime.dotnet.exceptions.count4 ± (4 - 4)4 ± (4 - 4)+0.0%
runtime.dotnet.mem.committed62.08 ± (62.00 - 62.17) MB61.59 ± (61.48 - 61.69) MB-0.8%
runtime.dotnet.threads.count30 ± (30 - 30)31 ± (31 - 31)+1.4%✅⬆️
.NET 8 - Baseline
process.internal_duration_ms190.16 ± (189.86 - 190.46) ms211.59 ± (211.12 - 212.07) ms+11.3%✅⬆️
process.time_to_main_ms69.51 ± (69.33 - 69.68) ms78.33 ± (78.04 - 78.62) ms+12.7%✅⬆️
runtime.dotnet.exceptions.count4 ± (4 - 4)4 ± (4 - 4)+0.0%
runtime.dotnet.mem.committed11.84 ± (11.81 - 11.88) MB11.62 ± (11.60 - 11.64) MB-1.9%
runtime.dotnet.threads.count18 ± (18 - 18)19 ± (19 - 19)+4.4%✅⬆️
.NET 8 - Bailout
process.internal_duration_ms190.07 ± (189.67 - 190.47) ms211.92 ± (211.32 - 212.53) ms+11.5%✅⬆️
process.time_to_main_ms70.62 ± (70.48 - 70.76) ms79.96 ± (79.73 - 80.18) ms+13.2%✅⬆️
runtime.dotnet.exceptions.count4 ± (4 - 4)4 ± (4 - 4)+0.0%
runtime.dotnet.mem.committed11.88 ± (11.85 - 11.90) MB11.65 ± (11.63 - 11.67) MB-1.9%
runtime.dotnet.threads.count19 ± (19 - 19)20 ± (20 - 20)+4.6%✅⬆️
.NET 8 - CallTarget+Inlining+NGEN
process.internal_duration_ms519.62 ± (517.02 - 522.21) ms562.45 ± (554.52 - 570.38) ms+8.2%✅⬆️
process.time_to_main_ms480.70 ± (480.02 - 481.38) ms532.48 ± (531.32 - 533.64) ms+10.8%✅⬆️
runtime.dotnet.exceptions.count4 ± (4 - 4)4 ± (4 - 4)+0.0%
runtime.dotnet.mem.committed50.96 ± (50.93 - 50.99) MB51.29 ± (51.20 - 51.39) MB+0.7%✅⬆️
runtime.dotnet.threads.count30 ± (30 - 30)30 ± (30 - 30)+0.1%✅⬆️
Comparison explanation

Execution-time benchmarks measure the whole time it takes to execute a program, and are intended to measure the one-off costs. Cases where the execution time results for the PR are worse than latest master results are highlighted in **red**. The following thresholds were used for comparing the execution times:

  • Welch test with statistical test for significance of 5%
  • Only results indicating a difference greater than 5% and 5 ms are considered.

Note that these results are based on a single point-in-time result for each branch. For full results, see the dashboard.

Graphs show the p99 interval based on the mean and StdDev of the test run, as well as the mean value of the run (shown as a diamond below the graph).

Duration charts
FakeDbCommand (.NET Framework 4.8)
gantt
    title Execution time (ms) FakeDbCommand (.NET Framework 4.8)
    dateFormat  x
    axisFormat %Q
    todayMarker off
    section Baseline
    This PR (8371) - mean (79ms)  : 72, 86
    master - mean (72ms)  : 70, 74

    section Bailout
    This PR (8371) - mean (96ms)  : crit, 91, 100
    master - mean (76ms)  : 74, 78

    section CallTarget+Inlining+NGEN
    This PR (8371) - mean (1,104ms)  : 998, 1211
    master - mean (1,075ms)  : 1027, 1124

Loading
FakeDbCommand (.NET Core 3.1)
gantt
    title Execution time (ms) FakeDbCommand (.NET Core 3.1)
    dateFormat  x
    axisFormat %Q
    todayMarker off
    section Baseline
    This PR (8371) - mean (113ms)  : 109, 117
    master - mean (113ms)  : 110, 116

    section Bailout
    This PR (8371) - mean (114ms)  : 111, 117
    master - mean (114ms)  : 112, 116

    section CallTarget+Inlining+NGEN
    This PR (8371) - mean (792ms)  : 768, 816
    master - mean (792ms)  : 771, 814

Loading
FakeDbCommand (.NET 6)
gantt
    title Execution time (ms) FakeDbCommand (.NET 6)
    dateFormat  x
    axisFormat %Q
    todayMarker off
    section Baseline
    This PR (8371) - mean (100ms)  : 96, 103
    master - mean (99ms)  : 95, 103

    section Bailout
    This PR (8371) - mean (100ms)  : 98, 103
    master - mean (100ms)  : 98, 103

    section CallTarget+Inlining+NGEN
    This PR (8371) - mean (948ms)  : 909, 986
    master - mean (946ms)  : 910, 982

Loading
FakeDbCommand (.NET 8)
gantt
    title Execution time (ms) FakeDbCommand (.NET 8)
    dateFormat  x
    axisFormat %Q
    todayMarker off
    section Baseline
    This PR (8371) - mean (99ms)  : 96, 101
    master - mean (98ms)  : 95, 101

    section Bailout
    This PR (8371) - mean (100ms)  : 97, 102
    master - mean (100ms)  : 98, 102

    section CallTarget+Inlining+NGEN
    This PR (8371) - mean (830ms)  : 796, 865
    master - mean (829ms)  : 793, 865

Loading
HttpMessageHandler (.NET Framework 4.8)
gantt
    title Execution time (ms) HttpMessageHandler (.NET Framework 4.8)
    dateFormat  x
    axisFormat %Q
    todayMarker off
    section Baseline
    This PR (8371) - mean (212ms)  : 205, 218
    master - mean (194ms)  : 189, 198

    section Bailout
    This PR (8371) - mean (216ms)  : crit, 211, 222
    master - mean (198ms)  : 192, 203

    section CallTarget+Inlining+NGEN
    This PR (8371) - mean (1,246ms)  : crit, 1186, 1307
    master - mean (1,178ms)  : 1095, 1261

Loading
HttpMessageHandler (.NET Core 3.1)
gantt
    title Execution time (ms) HttpMessageHandler (.NET Core 3.1)
    dateFormat  x
    axisFormat %Q
    todayMarker off
    section Baseline
    This PR (8371) - mean (308ms)  : 299, 317
    master - mean (277ms)  : 272, 283

    section Bailout
    This PR (8371) - mean (309ms)  : crit, 300, 319
    master - mean (277ms)  : 273, 280

    section CallTarget+Inlining+NGEN
    This PR (8371) - mean (1,036ms)  : crit, 1003, 1069
    master - mean (953ms)  : 929, 977

Loading
HttpMessageHandler (.NET 6)
gantt
    title Execution time (ms) HttpMessageHandler (.NET 6)
    dateFormat  x
    axisFormat %Q
    todayMarker off
    section Baseline
    This PR (8371) - mean (305ms)  : 295, 315
    master - mean (271ms)  : 266, 275

    section Bailout
    This PR (8371) - mean (302ms)  : crit, 297, 308
    master - mean (271ms)  : 268, 275

    section CallTarget+Inlining+NGEN
    This PR (8371) - mean (1,209ms)  : 1169, 1250
    master - mean (1,155ms)  : 1111, 1199

Loading
HttpMessageHandler (.NET 8)
gantt
    title Execution time (ms) HttpMessageHandler (.NET 8)
    dateFormat  x
    axisFormat %Q
    todayMarker off
    section Baseline
    This PR (8371) - mean (300ms)  : 293, 308
    master - mean (270ms)  : 265, 274

    section Bailout
    This PR (8371) - mean (303ms)  : crit, 295, 311
    master - mean (270ms)  : 265, 275

    section CallTarget+Inlining+NGEN
    This PR (8371) - mean (1,130ms)  : crit, 1019, 1240
    master - mean (1,034ms)  : 988, 1080

Loading

@bouwkast bouwkast force-pushed the steven/package-version-release-date-support branch from 84b9b6e to 545f246 Compare March 26, 2026 15:01
@bouwkast bouwkast marked this pull request as ready for review March 26, 2026 16:09
@bouwkast bouwkast requested review from a team as code owners March 26, 2026 16:09
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This change seems weird 🤔

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Isn't it "Hangfire.Core" and not "Hangfire" I couldn't get it to honor the cooldown as the NuGet name was wrong

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

OK, so this could be an interesting mis-match.... The assembly we instrument is Hangfire.Core:

but the package we use in the sample is Hangfire:

<PackageReference Include="Hangfire" Version="$(ApiVersion)" />

And it's the Hangfire package version which we need here, because it's the one we reference in the sample 🤔 And those will likely always match... but they don't have to...

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'll opt to follow up on this in another PR I think to try and rectify it

Comment thread .gitignore Outdated
new object[] { string.Empty },
#else
#if NET48
new object[] { "1.5.14" },
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That's weird 😅

Comment thread tracer/build/_build/GeneratePackageVersions/NuGetVersionCache.cs Outdated
Comment thread tracer/build/_build/GeneratePackageVersions/NuGetVersionCache.cs Outdated
Copy link
Copy Markdown
Member

@andrewlock andrewlock left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm just wondering, would it be easiest to just filter at the source when we load from NuGet? 🤔 and then everything else filters through. I guess you're trying to make it stable, but if we just forced 48 hours always then it would always be stable 🤷‍♂️ Not worried either way, just a thought 😄

NugetPackages.Add("Microsoft.VisualStudio.TraceDataCollector", Array.Empty<string>());
NugetPackages.Add("Microsoft.TestPlatform.CrossPlatEngine", Array.Empty<string>());
NugetPackages.Add("MSTest.TestFramework", Array.Empty<string>());
NugetPackages.Add("MSTest.TestFramework", new [] { "MSTest.TestFramework" });
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Wait, what are these even for again? 😅 do we need them in the manual instrumentation ones too?

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So the issue is that the ones I had to update here were all getting around as the "name"/"key" for them all comes from various locations and there are several disconnects, probably could do with a refactoring somewhere to make sure the names and keys all are consistent amongst all files somehow

If that answers it

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Honestly I'm completely confused, because I can't even remember what IntegrationGroups is for 😅 But maybe it's for the Hangfire/Hangfire.Core issue mentioned above?

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it is for the supported_versions and the Honeypot generations

I'll probably take a look at it in a follow up PR for the Hangfire/Hangfire.Core naming and see if there is anything we can do to simplify

Comment thread tracer/build/_build/Build.Utilities.cs Outdated
@bouwkast bouwkast force-pushed the steven/package-version-release-date-support branch from c4c28ec to c71f249 Compare March 27, 2026 17:38
@lucaspimentel
Copy link
Copy Markdown
Member

@codex review

Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 7921ed41c7

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment thread tracer/build/_build/Build.Utilities.cs Outdated
Comment on lines +257 to +260
.GroupBy(kvp => kvp.Key.PackageName)
.ToDictionary(
g => g.Key,
g => g.Max(kvp => new Version(kvp.Value.MaxVersionTestedInclusive!)));
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Scope cooldown baseline by package range

Building baseline as a single max tested version per package lets newer versions in lower compatibility ranges bypass the cooldown check. PackageVersionsGeneratorDefinitions.json contains multiple entries for the same package with different ranges (for example, GraphQL has 4.1.0-6.0.0 and 7.0.0-9.0.0), so a high tested baseline from one range (e.g., 8.x) makes all 5.x versions satisfy version <= baseline in ApplyCooldown, even when they were published within the cooldown window. That defeats the remediation goal for split-range packages; baseline needs to be keyed by the specific entry/range (or assembly+package) instead of package name alone.

Useful? React with 👍 / 👎.

.FirstOrDefault(v =>
{
publishDateLookup.TryGetValue(v.ToString(), out var d);
return !IsWithinCooldown(d) || (baselineVersion is not null && v <= baselineVersion);
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't understand why the version check is v <= baselineVersion. Can you explain?

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry it's a bit convoluted at the moment as the data is being pulled from supported_versions.json and PackageVersionsGeneratorDefinitions.json. It also doesn't work 100% perfectly at the moment, but I think that is fine as it will only break for some versions in that that it on CI we'd need to potentially re-run the job that runs once a week if a non-latest major version is released, am planning on fixing it better.

I'll just take the GraphQL example (deleting some bits from the JSON):

supported_versions.json

  {
    "integrationName": "GraphQL",
    "assemblyName": "GraphQL",
    "minAssemblyVersionInclusive": "2.3.0",
    "maxAssemblyVersionInclusive": "8.65535.65535",
    "packages": [
      {
        "name": "GraphQL",
        "maxVersionTestedInclusive": "8.8.4"
      }
    ]
  },

PackageVersionsGeneratorDefinitions.json

 {
    "IntegrationName": "GraphQL",
    "SampleProjectName": "Samples.GraphQL4",
    "NugetPackageSearchName": "GraphQL",
    "MinVersion": "4.1.0",
    "MaxVersionExclusive": "6.0.0",
  },
  {
    "IntegrationName": "GraphQL7",
    "SampleProjectName": "Samples.GraphQL7",
    "NugetPackageSearchName": "GraphQL",
    "MinVersion": "7.0.0",
    "MaxVersionExclusive": "9.0.0",
  },

We first read supported_versions.json which grabs our latest version tested for GraphQL => [8.8.4] (ideally we go and update supported_versions.json to be similar / equal to PackageVersionsGeneratorDefinitions.json)

We then process PackageVersionsGeneratorDefinitions.json and have two entries for GraphQL: 4.1.0 to 6.0.0 and 7.0.0 to 9.0.0

For the first range (4 to 6) we grab the "baseline" and we get that 8.8.4, all versions within 4 to 6 will be less than that so they will always have the cooldown filtering logic applied to their versions, technically a bug but I figure it isn't terribly important at the moment, but something to follow up on. (example is if some 6.* version just came out this will revert it on the CI job if it is within the cooldown period)

For the second range (7.0.0 to 9.0.0) we grab the "baseline" and get 8.8.4, any version on NuGet above 8.8.4 will have the filtering logic applied to it.

Also, the baseline allows for us to update manually to a latest version locally, push it up and have the CI step ignore it. But we can't for that intermediate version at the moment (we could generate the files locally and then update the automated PR)

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I must admit I'm still a little confused but overall the approach sounds thought-out 😅

Copy link
Copy Markdown
Contributor

@zacharycmontoya zacharycmontoya left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, though the baseline and cooldown comparisons are still a little confusing to me 😅

@bouwkast bouwkast merged commit 5f7ed4d into master Apr 1, 2026
139 checks passed
@bouwkast bouwkast deleted the steven/package-version-release-date-support branch April 1, 2026 13:48
@github-actions github-actions Bot added this to the vNext-v3 milestone Apr 1, 2026
igoragoli pushed a commit that referenced this pull request Apr 8, 2026
…encies (#8371)

## Summary of changes

> default cooldown period is 2 days

Adds a configurable cooldown period to the `GeneratePackageVersions` to
support remediation efforts for follow up after #incident-51602.

To use supply the optional parameter `--PackageVersionCooldownDays X`
where `X` is some number of days. The current period is at the moment is
going to be 2 days and is the default now when the overall
`GeneratePackageVersion` target is ran. Additionally, this is overridden
to 0 if `--IncludePackages` is supplied (this is commonly used when
working on a singular package locally).

After running the tool a "cooldown" report is generated, this file will
contain packages that we see have a newer version, but will not
incorporate into the test, the fallback version that falls within the
cooldown period is provided. This file content will show up in the
output of future test package version bump PRs.

Note that this is for _automated_ updates, so if it sees something
already updated it will honor it.

Here's an example output ran locally with 14 days set:

```
## Package Version Cooldown Report

The following versions were published less than **14 days** ago and have been overridden.
These require manual review before inclusion.

| Package | Integration | Overridden Version | Published | Age (days) | Using Instead |
|---------|-------------|--------------------|-----------|------------|---------------|
| AWSSDK.Core | AwsSdk | 4.0.3.22 | 2026-03-25 | 0 | 4.0.3.21 |
| AWSSDK.S3 | AwsS3 | 4.0.19.2 | 2026-03-25 | 0 | 4.0.19.1 |
| StackExchange.Redis | StackExchangeRedis | 2.12.8 | 2026-03-25 | 0 | 2.12.4 |
```

## Reason for change

In #8364 and
#incident-51602 all automated dependency updaters to be disabled
temporarily, to re-enable we need to supply a 2 day "cooldown" to any
version that we update to (in other words the version of the NuGet must
be published for at least 2 days before we can update to it).

## Implementation details

I made Claude do this 🤖 

- NuGetPackageHelper now captures the Published date from
IPackageSearchMetadata via a new VersionWithDate record (previously
discarded)
  - NuGetVersionCache stores the new {Version, Published} format
- PackageVersionGenerator.ApplyCooldown filters selected versions after
LatestMajors/LatestMinors/LatestSpecific selection:
    - Versions outside the cooldown window pass through unchanged
- Versions at or below the baseline (derived from
supported_versions.json MaxVersionTestedInclusive) are kept even if
  within cooldown -- no downgrades
- Versions above the baseline and within cooldown are overridden to the
best available fallback
- CooldownReport collects overridden versions and renders a markdown
table saved to tracer/build/cooldown_report.md
- The GitHub Actions workflow reads the report and appends it to the
auto-bump PR body
- Honeypot IntegrationGroups.cs fixes: MSTest.TestFramework now maps to
itself, Hangfire.Core maps to Hangfire.Core (was Hangfire), OpenFeature
mapping moved to Datadog.FeatureFlags.OpenFeature

Passing `--IncludePackages` will override the cooldown to 0

## Test coverage

I ran `GeneratePackageVersions --PackageVersionCooldownDays 14` locally
seems good enough IMO (also ran without, with different days etc)

```
[WRN] GeneratePackageVersi: 3 package version(s) were excluded due to the 14-day cooldown period
[WRN] GeneratePackageVersi:   AWSSDK.Core 4.0.3.22 overridden (published 2026-03-25, using: 4.0.3.21)
[WRN] GeneratePackageVersi:   AWSSDK.S3 4.0.19.2 overridden (published 2026-03-25, using: 4.0.19.1)
[WRN] GeneratePackageVersi:   StackExchange.Redis 2.12.8 overridden (published 2026-03-25, using: 2.12.4)
```

## Other details
<!-- Fixes #{issue} -->

The workflow file (`auto_bump_test_package_versions.yml`) will be
re-enabled with this PR

<!--  ⚠️ Note:

Where possible, please obtain 2 approvals prior to merging. Unless
CODEOWNERS specifies otherwise, for external teams it is typically best
to have one review from a team member, and one review from apm-dotnet.
Trivial changes do not require 2 reviews.

MergeQueue is NOT enabled in this repository. If you have write access
to the repo, the PR has 1-2 approvals (see above), and all of the
required checks have passed, you can use the Squash and Merge button to
merge the PR. If you don't have write access, or you need help, reach
out in the #apm-dotnet channel in Slack.
-->
igoragoli added a commit that referenced this pull request Apr 8, 2026
commit d5d94dd7eb8e5ec080ffbe3b5b7d89aafe95fef9
Author: Augusto de Oliveira <augusto.deoliveira@datadoghq.com>
Date:   Wed Apr 8 06:58:34 2026 +0200

    Update microbenchmark design to reduce flakiness (#8300)

    ## Summary of changes

    - Update the benchmark design to reduce flakiness.
    - See [other details for flakiness reduction results](#other-details).
    - Move benchmarking from [benchmarking-platform @
    dd-trace-dotnet/micro](https://github.com/DataDog/benchmarking-platform/tree/dd-trace-dotnet/micro)
    to this repo.
        - This is why we have +1k lines (sorry!).
    - Include `BytesAllocatedPerOperation` as `allocated_mem` into our
    benchmarking results.

    ## Reason for change

    [APMSP-2291 Identify and fix flaky dd-trace-dotnet microbenchmark
    scenarios](https://datadoghq.atlassian.net/browse/APMSP-2291)

    ## Implementation details

    ### Benchmark design changes (what reduced flakiness)

    1. Run every benchmark 10 times (`launchCount`).
    - This is important to mitigate inter-run variance, which can be caused
    by things such as varying memory placement across runs.
    2. Manually set warmup iterations to 10 (`warmupCount`).
    - On average, the number of automatically determined warmup iterations
    is ~15 for the current benchmarking setup.
        - I got this down to 10 because:
            - I needed to make benchmarks faster.
    - On average, every iteration runs the benchmark method for hundreds of
    thousands of times, so I hypothesized that 5 less warmup iterations
    would not affect results significantly.
    - We were already doing 10 runs. I hypothesized that stability would
    come from different process samples, not from a deeper warmup within a
    single process.
    3. Manually set actual iterations to 10 (`iterationCount`).
    - On average, the number of automatically determined warmup iterations
    is ~35 for the current benchmarking setup. Some
    (`CIVisibilityProtocolWriterBenchmark.WriteAndFlushEnrichedTraces`,
    `StringConcatAspectBenchmark`, `StringConcatBenchmark`) go up to 120.
    - I got this down to 10 because of the same reasons described on change
    2.
    4. Kept a "base" `iterationTime` of 200 ms, but set `iterationTime` on
    flaky benchmarks to 500 ms.
    - Increasing the `iterationTime` for flaky benchmarks helps immensely.
    We're able to capture much more variation into our samples once we fit
    more operations into the iteration. I tried many configurations, this
    turned out to be the minimum we need.

    ### Benchmark execution changes (what allowed me to implement the
    benchmark design changes)

    1. Moved code from [benchmarking-platform @
    dd-trace-dotnet/micro](https://github.com/DataDog/benchmarking-platform/tree/dd-trace-dotnet/micro)
    to here.
    - This is just easier to understand, and doesn't require changing two
    repos to update benchmarks.
    - ⚠️ We just have to move the `ami.yaml` to build the AMIs with which we
    run microbenchmarks. But there's some preliminary work to avoid
    dd-octo-sts failures on this repo. Captured on
    [APMSP-2736](https://datadoghq.atlassian.net/browse/APMSP-2736).
    2. Used `bp-runner` to run the benchmarks, since it allows us to run
    microbenchmarks in parallel on isolated CPU sets.
    - This was crucial to allow us to run 10 launches. The current
    benchmarking job takes 50 minutes (20 min build + 30 min benchmarks). By
    running things 10 times sequentially it would take us 320 minutes.
    3. Split benchmarks into two batches: flaky ones and non-flaky ones. I
    moved the non-flaky ones to CPUs in NUMA node 1 because Windows often
    runs system processes on the first NUMA node, which can affect results.

    ### Benchmark class/Build.cs changes

    1. `Build.cs`:
    - Added a `BuildBenchmarks` target to build all benchmark executables in
    one go (needed for `bp-runner` parallel execution).
    2. **`AppSecWafBenchmark.cs` / `AppSecBenchmarkUtils.cs`**: Fixed path
    resolution to make .NET Framework 4.7.2 benchmarks run in parallel.
    - Changed `Directory.GetCurrentDirectory()` and
    `Environment.CurrentDirectory` to `AppContext.BaseDirectory`.
    - BenchmarkDotNet spawns a separate process for each benchmark run, and
    on .NET Framework the working directory doesn't match the executable
    directory. This caused WAF initialization to fail with "No valid rules
    found" because the rules file and native libraries couldn't be located.
    - Added `[IterationTime(500)]` attribute to benchmarks identified as
    flaky (e.g., `AspNetCoreBenchmark`).

    ## Test coverage

    - [x] CI job succeeds:
    https://gitlab.ddbuild.io/DataDog/apm-reliability/dd-trace-dotnet/-/jobs/1524793394
    - [x] Results are uploaded to S3:
    https://gitlab.ddbuild.io/DataDog/apm-reliability/dd-trace-dotnet/-/jobs/1524793394#L3875
    - [x] Results are uploaded to the BP UI:
    https://gitlab.ddbuild.io/DataDog/apm-reliability/dd-trace-dotnet/-/jobs/1524793394#L4200
    and
    https://benchmarking.us1.prod.dog/benchmarks?projectId=9&ciJobDateStart=1771416292448&ciJobDateEnd=1774008292448&gitBranch=augusto%2Ffix-microbenchmarks&benchmarkGroupPipelineId=103686524&benchmarkGroupSha=ce6c9b12

    ## Other details
    <!-- Fixes #{issue} -->

    ### How did we measure flakiness?

    1. Run the `run-benchmarks` job for the same commit 10 times.
    2. Cross-validate results.
    - For every benchmark and metric (`execution_time`, `throughtput`, and
    `allocated_mem`✨), we compute the **_false positive rate_** and the
    **_max confidence interval difference_**.
    - The **_false positive rate_** is how often the benchmark system
    incorrectly flags a "regression" when comparing identical code.
    - The **_max confidence interval difference_** is the largest spurious
    difference observed across all 45 comparisons of `run-benchmarks`
    results when comparing identical code.

    ### How much did flakiness drop?

    - The false positive rate  dropped from 5.7% to 3.8%.
    - The maximum CI difference dropped from 56% to 16.66%.

    See the [per-benchmark/metric
    breakdown](https://docs.google.com/spreadsheets/d/103hjAaXOBSbwSHfD-nhBoM23j8dLdeenRMGAS2TeBGU/edit?usp=sharing)

    This graph shows intuitively the distribution of FP rates and max CI
    differences for all comparisons. **The more weight the distribution has
    closer to 0, the better.** Memory allocation results are already pretty
    stable, so it's hard to see a clear win there.

    <img width="1213" height="601" alt="image"
    src="https://github.com/user-attachments/assets/b95e8d0d-1092-48e0-8ff7-ceda61174a63"
    />

    ### How were flaky benchmarks determined (necessary to choose a higher
    `iterationTime` for them)?

    1. Started with existing ignored list @NachoEchevarria and I created.
    2. Ran stability experiments and refined based on data (again,
    [per-benchmark/metric
    breakdown](https://docs.google.com/spreadsheets/d/103hjAaXOBSbwSHfD-nhBoM23j8dLdeenRMGAS2TeBGU/edit?usp=sharing))
    - AppSec benchmarks (`AppSecWafBenchmark`, `AppSecBodyBenchmark`): Moved
    to stable batch. With the new design, most FP rates are under 5%, only
    one outlier at 20% for the `netcoreapp3.1` runtime.
    - `AspNetCoreBenchmark`: Consistently over 20% FP even with optimized
    design.
    - `AgentWriterBenchmark`: Added to flaky batch. Most methods are stable,
    but `WriteAndFlushEnrichedTraces netcoreapp3.1` is VERY problematic.

    <!--  ⚠️ Note:

    Where possible, please obtain 2 approvals prior to merging. Unless
    CODEOWNERS specifies otherwise, for external teams it is typically best
    to have one review from a team member, and one review from apm-dotnet.
    Trivial changes do not require 2 reviews.

    MergeQueue is NOT enabled in this repository. If you have write access
    to the repo, the PR has 1-2 approvals (see above), and all of the
    required checks have passed, you can use the Squash and Merge button to
    merge the PR. If you don't have write access, or you need help, reach
    out in the #apm-dotnet channel in Slack.
    -->

    [APMSP-2736]:
    https://datadoghq.atlassian.net/browse/APMSP-2736?atlOrigin=eyJpIjoiNWRkNTljNzYxNjVmNDY3MDlhMDU5Y2ZhYzA5YTRkZjUiLCJwIjoiZ2l0aHViLWNvbS1KU1cifQ

commit 275c3a4b037764154277a7cea2a275ab788751d7
Author: dd-octo-sts[bot] <200755185+dd-octo-sts[bot]@users.noreply.github.com>
Date:   Tue Apr 7 13:47:42 2026 -0400

    [Version Bump] 3.42.0 (#8419)

    The following files were found to be modified (as expected)

    - [x] docs/CHANGELOG.md
    - [x] .azure-pipelines/ultimate-pipeline.yml
    - [x]
    profiler/src/ProfilerEngine/Datadog.Profiler.Native.Linux/CMakeLists.txt
    - [x]
    profiler/src/ProfilerEngine/Datadog.Profiler.Native.Windows/Resource.rc
    - [x]
    profiler/src/ProfilerEngine/Datadog.Profiler.Native/dd_profiler_version.h
    - [x]
    profiler/src/ProfilerEngine/Datadog.Linux.ApiWrapper/CMakeLists.txt
    - [x] profiler/src/ProfilerEngine/ProductVersion.props
    - [x] shared/src/Datadog.Trace.ClrProfiler.Native/CMakeLists.txt
    - [x] shared/src/Datadog.Trace.ClrProfiler.Native/Resource.rc
    - [x] shared/src/msi-installer/WindowsInstaller.wixproj
    - [x] shared/src/native-src/version.h
    - [x] tracer/build/artifacts/dd-dotnet.sh
    - [x] tracer/build/_build/Build.cs
    - [x]
    tracer/samples/AutomaticTraceIdInjection/MicrosoftExtensionsExample/MicrosoftExtensionsExample.csproj
    - [x]
    tracer/samples/AutomaticTraceIdInjection/Log4NetExample/Log4NetExample.csproj
    - [x]
    tracer/samples/AutomaticTraceIdInjection/NLog40Example/NLog40Example.csproj
    - [x]
    tracer/samples/AutomaticTraceIdInjection/NLog45Example/NLog45Example.csproj
    - [x]
    tracer/samples/AutomaticTraceIdInjection/NLog46Example/NLog46Example.csproj
    - [x]
    tracer/samples/AutomaticTraceIdInjection/SerilogExample/SerilogExample.csproj
    - [x] tracer/samples/ConsoleApp/Alpine3.10.dockerfile
    - [x] tracer/samples/ConsoleApp/Alpine3.9.dockerfile
    - [x] tracer/samples/ConsoleApp/Debian.dockerfile
    - [x] tracer/samples/OpenTelemetry/Debian.dockerfile
    - [x] tracer/samples/WindowsContainer/Dockerfile
    - [x] tracer/src/Datadog.Trace.ClrProfiler.Managed.Loader/Startup.cs
    - [x] tracer/src/Datadog.Tracer.Native/CMakeLists.txt
    - [x] tracer/src/Datadog.Tracer.Native/dd_profiler_constants.h
    - [x] tracer/src/Datadog.Tracer.Native/Resource.rc
    - [x] tracer/src/Directory.Build.props
    - [x] tracer/src/Datadog.Trace/TracerConstants.cs

    @DataDog/apm-dotnet

    Co-authored-by: link04 <28125428+link04@users.noreply.github.com>

commit 84efe2bfa576e95bbb385bbeb5832ee5ccc51648
Author: Raphaël Vandon <raphael.vandon@datadog.com>
Date:   Fri Apr 3 07:00:29 2026 +0100

    maybe fix macos smoketests (#8413)

    ## Summary of changes

    ## Reason for change

    ## Implementation details

    ## Test coverage

    ## Other details
    <!-- Fixes #{issue} -->

    <!--  ⚠️ Note:

    Where possible, please obtain 2 approvals prior to merging. Unless
    CODEOWNERS specifies otherwise, for external teams it is typically best
    to have one review from a team member, and one review from apm-dotnet.
    Trivial changes do not require 2 reviews.

    MergeQueue is NOT enabled in this repository. If you have write access
    to the repo, the PR has 1-2 approvals (see above), and all of the
    required checks have passed, you can use the Squash and Merge button to
    merge the PR. If you don't have write access, or you need help, reach
    out in the #apm-dotnet channel in Slack.
    -->

commit 09325736fb3fb2c626d25e94b8e970a7fa02459f
Author: Zach Montoya <zach.montoya@datadoghq.com>
Date:   Thu Apr 2 15:54:55 2026 -0700

    [Tracing] Update mapping from Datadog to OTLP spans (#8385)

    ## Summary of changes
    Add core Datadog semantics as span attributes. This ensures that the
    core semantics are identified when the Datadog Agent / backend receives
    OTLP spans and translates them into Datadog spans that power the
    backend.

    ## Reason for change
    We should keep the same Datadog experience regardless of the tracing
    protocol used. These changes facilitate that.

    ## Implementation details
    Updates `Datadog.Trace.OpenTelemetry.OtlpMapper.EmitAttributesFromSpan`
    to add several span attributes sourced from `Datadog.Trace.Span`
    properties:
    - `Span.ServiceName` => `OtlpSpan.Attributes["service.name"]`
    - `Span.OperationName` => `OtlpSpan.Attributes["operation.name"]`
    - `Span.ResourceName` => `OtlpSpan.Attributes["resource.name"]`
    - `Span.Type` => `OtlpSpan.Attributes["span.type"]`

    ## Test coverage
    - Unit tests: Added unit tests for
    `Datadog.Trace.OpenTelemetry.OtlpMapper` which handles the mapping from
    Datadog-specific concepts into OTLP attributes
    - Integration tests: Updated the snapshot for `OpenTelemetrySdkTests`

    ## Other details
    N/A

commit 32c92b2a10d2299f612d41a89e34c16f18ae5273
Author: Lucas Pimentel <lucas.pimentel@datadoghq.com>
Date:   Thu Apr 2 15:57:58 2026 -0400

    [Tests] Use `EnvironmentRestorer` to prevent env var leaks (#8388)

    ## Summary of changes

    Add `[EnvironmentRestorer]` attribute to test classes/methods that call
    `Environment.SetEnvironmentVariable` without proper cleanup, preventing
    environment variable leaks between tests.

    ## Reason for change

    Several test files were setting environment variables without restoring
    them, which could cause flaky or order-dependent test failures due to
    leaked state.

    ## Implementation details

    - **`EnvironmentRestorerAttribute`**: Allow usage on methods
    (`AttributeTargets.Method`) in addition to classes
    - **`TelemetrySettingsAgentlessSettingsTests`**: Replace manual
    `IDisposable` save/restore with class-level `[EnvironmentRestorer]`
    - **`AzurePerformanceCountersListenerTests`**: Add class-level
    `[EnvironmentRestorer("WEBSITE_COUNTERS_CLR")]` (previously had no
    restore at all)
    - **`LegacyCommandLineArgumentsTests.SetCi`**: Add method-level
    `[EnvironmentRestorer("TF_BUILD")]`, remove manual try/finally
    - **`ConfigureCiCommandTests.ConfigureCi`**: Add method-level
    `[EnvironmentRestorer("GITHUB_ENV")]`, remove manual save/restore
    - `AutodetectCi` keeps its manual try/finally because it clears all
    environment variables, which the attribute can't handle

    ## Test coverage

    Existing tests cover the affected functionality. No new tests needed —
    this is a cleanup of test infrastructure.

    ## Other details

    > *"I tried to leak an environment variable once, but it was restored
    before anyone noticed."* — Claude 🤖

    ---------

    Co-authored-by: Andrew Lock <andrew.lock@datadoghq.com>

commit 5686c1c6af5f1e8fa3724aa82ddbd7f29ba90b43
Author: Andrew Lock <andrew.lock@datadoghq.com>
Date:   Thu Apr 2 20:12:30 2026 +0100

    Add potential fix for duck typing derived types (#8410)

    ## Summary of changes

    Potentially fixes a `FieldAccessException` in some cases

    ## Reason for change

    We have seen stack traces like the following in production:

    ```bash
    Error : Error creating or populating span.
    System.FieldAccessException
       at REDACTED
       at Datadog.Trace.ClrProfiler.ScopeFactory.CreateInactiveOutboundHttpSpan(Tracer tracer, String httpMethod, Uri requestUri, IntegrationId integrationId, HttpTags& tags, TraceId traceId, UInt64 spanId, Nullable`1 startTime, Boolean addToTraceContext)
    ```

    After a bunch of 🤖 noodling and testing (and based on @zacharycmontoya
    idea), proved that we can repro this stack (sort of, assuming inlining)
    if we _derive_ from `System.Uri`. The error happens because we apply
    `IgnoresAccessChecksToAttribute` to the target type (i.e. the derived
    type) during ducktyping, but it _needs_ to be applied to the
    `targetField.DeclaringType`.

    ## Implementation details

    Updated the `UseDirectAccessTo` calls to point to the type that "owns"
    the field, instead of the current instance.

    ## Test coverage

    Added a test confirming the error, and then showing it passed

    ## Other details

    https://app.datadoghq.com/cases/APMLP-35

commit ef71061988a026654c7e784732980f8d468499ad
Author: Andrew Lock <andrew.lock@datadoghq.com>
Date:   Thu Apr 2 19:13:17 2026 +0100

    Revert YARP exclusion (#8407)

    ## Summary of changes

    Reverts including YARP spans in the ignore handler

    ## Reason for change

    We were a bit hasty including this in #8370

    ## Implementation details

    Remove it again

    ## Test coverage

    Explicitly disabling OTel in the test instead for now. There's nothing
    _wrong_ with the span, just inconsistency between versions. We could
    consider having different snapshots, but I'll do that as part of a
    follow up, as its important to get this in fast

commit bd1574507e3588ee7743ee4befcccf0357956f3d
Author: Steven Bouwkamp <steven.bouwkamp@datadoghq.com>
Date:   Thu Apr 2 11:07:30 2026 -0400

    Skip some errors from being sent to telemetry (#8003)

    ## Summary of changes

    Skips a few errors that are `Ignored` in Error Tracking and shouldn't
    really be sent to telemetry as we can't act on them.

    ## Reason for change

    Nothing we can really do about these.

    ## Implementation details

    Marked as `ErrorSkipTelemetry`

    ## Test coverage

    N/A

    ## Other details
    <!-- Fixes #{issue} -->

    I guess one thing we do lose here is whether we _want_ to see how often
    these happen?

    <!--  ⚠️ Note:

    Where possible, please obtain 2 approvals prior to merging. Unless
    CODEOWNERS specifies otherwise, for external teams it is typically best
    to have one review from a team member, and one review from apm-dotnet.
    Trivial changes do not require 2 reviews.

    MergeQueue is NOT enabled in this repository. If you have write access
    to the repo, the PR has 1-2 approvals (see above), and all of the
    required checks have passed, you can use the Squash and Merge button to
    merge the PR. If you don't have write access, or you need help, reach
    out in the #apm-dotnet channel in Slack.
    -->

commit 291ef8e6f8c27b2bdc422dfd218888a4e07a2c7c
Author: Lucas Pimentel <lucas.pimentel@datadoghq.com>
Date:   Thu Apr 2 11:01:47 2026 -0400

    [CI Tools] Add prerequisite validation to AzureDevOps helper scripts (#8409)

    ## Summary of changes

    Add a `Test-Prerequisites` function to `AzureDevOpsHelpers.psm1` that
    validates all required CLI tools are installed, authenticated, and
    properly configured before running Azure DevOps build analysis or retry
    scripts.

    ## Reason for change

    When users run `Get-AzureDevOpsBuildAnalysis.ps1` or
    `Retry-AzureDevOpsFailedStages.ps1` directly (not via the Claude skill),
    missing or misconfigured prerequisites produce unhelpful error messages.
    The Claude skill had guidance for these scenarios, but the scripts
    themselves only checked if `az` and `gh` were installed.

    ## Implementation details

    New `Test-Prerequisites` function checks (in order):
    1. **`az` CLI installed** — with install links for Windows/macOS
    2. **`azure-devops` extension** — with `az extension add` command
    3. **`az` authenticated** — with `az login` guidance (including MFA
    hint)
    4. **Subscription logging** — logs current subscription at `Verbose`
    level for troubleshooting
    5. **`gh` CLI installed** — only when needed for PR-based resolution
    6. **`gh` authenticated** — scoped to `github.com` only, so GHES auth
    issues don't block

    `Resolve-BuildId` (the shared entry point for both scripts) now
    delegates to `Test-Prerequisites` instead of inline `Get-Command`
    checks.

    Additionally, `Invoke-AzDevOpsApi` now includes a troubleshooting tip in
    its error message suggesting the user check and switch Azure
    subscriptions if needed.

    ## Test coverage

    Tested manually:
    - [x] `az` not installed
    - [x] `az` installed without `azure-devops` extension
    - [x] `az` installed but not authenticated
    - [x] `gh` not installed
    - [x] `gh` installed but not authenticated

    ## Other details

    The subscription is not validated upfront because `az devops invoke
    --org <url> --detect false` targets the org URL directly, so the
    subscription doesn't strictly control API routing. However, the wrong
    subscription can affect token permissions, so `Invoke-AzDevOpsApi` now
    suggests checking subscriptions in its error message.

    > *"I validate your prerequisites so you don't have to validate your
    life choices."* — Claude 🤖

    ---------

    Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

commit 94d461d7e1a32e617ef723764c6c5275c19fcef3
Author: Raphaël Vandon <raphael.vandon@datadog.com>
Date:   Thu Apr 2 16:00:53 2026 +0100

    scrub process tags from debugger snapshots (#8406)

    ## Summary of changes

    follow up on https://github.com/DataDog/dd-trace-dotnet/pull/8296
    debugger itests didn't run in the PR
    so we missed the fact that we need to apply the same scrubbing we did on
    other tests for those too

    ## Reason for change

    ## Implementation details

    ## Test coverage

    ## Other details
    <!-- Fixes #{issue} -->

    <!--  ⚠️ Note:

    Where possible, please obtain 2 approvals prior to merging. Unless
    CODEOWNERS specifies otherwise, for external teams it is typically best
    to have one review from a team member, and one review from apm-dotnet.
    Trivial changes do not require 2 reviews.

    MergeQueue is NOT enabled in this repository. If you have write access
    to the repo, the PR has 1-2 approvals (see above), and all of the
    required checks have passed, you can use the Squash and Merge button to
    merge the PR. If you don't have write access, or you need help, reach
    out in the #apm-dotnet channel in Slack.
    -->

commit a57df1c432ebf06bec5c71b9aa2a3581b4cd9090
Author: gh-worker-campaigns-3e9aa4[bot] <244854796+gh-worker-campaigns-3e9aa4[bot]@users.noreply.github.com>
Date:   Thu Apr 2 11:45:53 2026 +0000

    chore(ci) update one-pipeline (#8403)

    This pull request updates one-pipeline to a newer version.

    Recent changes:
    Add CA certificates to SSI images using BusyBox, to prevent TLS failures
    (See https://github.com/DataDog/libdatadog-build/pull/194)

    Some of these changes may have already applied depending on your
    previous version of one-pipeline. See the libdatadog-build repository
    for all changes

    Co-authored-by: gh-worker-campaigns-3e9aa4[bot] <244854796+gh-worker-campaigns-3e9aa4[bot]@users.noreply.github.com>

commit b68393db419d884599a96f4a989da06e4638d1a4
Author: Raphaël Vandon <raphael.vandon@datadog.com>
Date:   Thu Apr 2 10:33:42 2026 +0100

    switch process tags on by default (#8296)

    ## Summary of changes

    all features have been implemented, we can now GA this to all customers

    ## Reason for change

    ## Implementation details

    depends on
    https://github.com/DataDog/dd-trace-dotnet/pull/8061
    https://github.com/DataDog/dd-trace-dotnet/pull/8163
    https://github.com/DataDog/dd-trace-dotnet/pull/8295
    theoretically, https://github.com/DataDog/dd-trace-dotnet/pull/8282 as
    well

    ## Test coverage

    ## Other details
    <!-- Fixes #{issue} -->

    I took the liberty to refactor the asserts in AgentWriterTest to use
    actual asserts instead of asserting through the mock's `Verify`, so that
    we get more actionable errors when the test fails

    <!--  ⚠️ Note:

    Where possible, please obtain 2 approvals prior to merging. Unless
    CODEOWNERS specifies otherwise, for external teams it is typically best
    to have one review from a team member, and one review from apm-dotnet.
    Trivial changes do not require 2 reviews.

    MergeQueue is NOT enabled in this repository. If you have write access
    to the repo, the PR has 1-2 approvals (see above), and all of the
    required checks have passed, you can use the Squash and Merge button to
    merge the PR. If you don't have write access, or you need help, reach
    out in the #apm-dotnet channel in Slack.
    -->

commit 57de0e2dfa7ecc06ca1608bd5fd2041f9fa8d76a
Author: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Date:   Thu Apr 2 08:52:55 2026 +0000

    Bump the gh-actions-packages group across 2 directories with 5 updates (#8404)

    Bumps the gh-actions-packages group with 4 updates in the / directory:
    [actions/setup-dotnet](https://github.com/actions/setup-dotnet),
    [DataDog/dd-octo-sts-action](https://github.com/datadog/dd-octo-sts-action),
    [slackapi/slack-github-action](https://github.com/slackapi/slack-github-action)
    and [github/codeql-action](https://github.com/github/codeql-action).
    Bumps the gh-actions-packages group with 1 update in the
    /.github/actions/publish-debug-symbols directory:
    [actions/setup-go](https://github.com/actions/setup-go).

    Updates `actions/setup-dotnet` from 5.1.0 to 5.2.0
    <details>
    <summary>Release notes</summary>
    <p><em>Sourced from <a
    href="https://github.com/actions/setup-dotnet/releases">actions/setup-dotnet's
    releases</a>.</em></p>
    <blockquote>
    <h2>v5.2.0</h2>
    <h2>What's changed</h2>
    <h3>Enhancements</h3>
    <ul>
    <li>Add support for workloads input by <a
    href="https://github.com/gowridurgad"><code>@​gowridurgad</code></a> in
    <a
    href="https://github.com/actions/setup-dotnet/pull/693">actions/setup-dotnet#693</a></li>
    <li>Add support for optional architecture input for cross-architecture
    .NET installs by <a
    href="https://github.com/priya-kinthali"><code>@​priya-kinthali</code></a>
    in <a
    href="https://github.com/actions/setup-dotnet/pull/700">actions/setup-dotnet#700</a></li>
    </ul>
    <h3>Dependency Updates</h3>
    <ul>
    <li>Upgrade fast-xml-parser from 4.4.1 to 5.3.6 by <a
    href="https://github.com/dependabot"><code>@​dependabot</code></a> in <a
    href="https://github.com/actions/setup-dotnet/pull/671">actions/setup-dotnet#671</a></li>
    <li>Upgrade minimatch from 3.1.2 to 3.1.5 by <a
    href="https://github.com/dependabot"><code>@​dependabot</code></a> in <a
    href="https://github.com/actions/setup-dotnet/pull/705">actions/setup-dotnet#705</a></li>
    </ul>
    <p><strong>Full Changelog</strong>: <a
    href="https://github.com/actions/setup-dotnet/compare/v5...v5.2.0">https://github.com/actions/setup-dotnet/compare/v5...v5.2.0</a></p>
    </blockquote>
    </details>
    <details>
    <summary>Commits</summary>
    <ul>
    <li><a
    href="https://github.com/actions/setup-dotnet/commit/c2fa09f4bde5ebb9d1777cf28262a3eb3db3ced7"><code>c2fa09f</code></a>
    Bump minimatch from 3.1.2 to 3.1.5 (<a
    href="https://github.com/actions/setup-dotnet/issues/705">#705</a>)</li>
    <li><a
    href="https://github.com/actions/setup-dotnet/commit/02574b18e2dc57a218ee4e11ba1e1603c67236e8"><code>02574b1</code></a>
    Add support for optional architecture input for cross-architecture .NET
    insta...</li>
    <li><a
    href="https://github.com/actions/setup-dotnet/commit/16c7b3c2fa55a0e394467d22512b84fda46adf63"><code>16c7b3c</code></a>
    Bump fast-xml-parser from 4.4.1 to 5.3.6 (<a
    href="https://github.com/actions/setup-dotnet/issues/671">#671</a>)</li>
    <li><a
    href="https://github.com/actions/setup-dotnet/commit/131b410979e0b49e2162c0718030257b22d6dc2c"><code>131b410</code></a>
    Add support for workloads input (<a
    href="https://github.com/actions/setup-dotnet/issues/693">#693</a>)</li>
    <li>See full diff in <a
    href="https://github.com/actions/setup-dotnet/compare/v5.1.0...c2fa09f4bde5ebb9d1777cf28262a3eb3db3ced7">compare
    view</a></li>
    </ul>
    </details>
    <br />

    Updates `DataDog/dd-octo-sts-action` from 1.0.3 to 1.0.4
    <details>
    <summary>Commits</summary>
    <ul>
    <li><a
    href="https://github.com/DataDog/dd-octo-sts-action/commit/96a25462dbcb10ebf0bfd6e2ccc917d2ab235b9a"><code>96a2546</code></a>
    Fix typo in Readme (<a
    href="https://github.com/datadog/dd-octo-sts-action/issues/18">#18</a>)</li>
    <li><a
    href="https://github.com/DataDog/dd-octo-sts-action/commit/9691c26e1de0f1f26e1e8708c5c34b4f64e43f5f"><code>9691c26</code></a>
    Merge pull request <a
    href="https://github.com/datadog/dd-octo-sts-action/issues/14">#14</a>
    from DataDog/improve/parse-jwt-claims</li>
    <li><a
    href="https://github.com/DataDog/dd-octo-sts-action/commit/b98b59d08d3575cbda7001bddfe86633787536e8"><code>b98b59d</code></a>
    Merge pull request <a
    href="https://github.com/datadog/dd-octo-sts-action/issues/13">#13</a>
    from DataDog/improve/fetch-error-url-logging</li>
    <li><a
    href="https://github.com/DataDog/dd-octo-sts-action/commit/e7953d4e870e933635e6afa9172b3957b568c417"><code>e7953d4</code></a>
    Merge pull request <a
    href="https://github.com/datadog/dd-octo-sts-action/issues/15">#15</a>
    from DataDog/improve/ci-workflow-hardening</li>
    <li><a
    href="https://github.com/DataDog/dd-octo-sts-action/commit/e47344e9570a80d3a7d333a339ace4a5e88b7646"><code>e47344e</code></a>
    Merge pull request <a
    href="https://github.com/datadog/dd-octo-sts-action/issues/16">#16</a>
    from DataDog/improve/bump-node24</li>
    <li><a
    href="https://github.com/DataDog/dd-octo-sts-action/commit/5a7a632cb3be2334cd1515df9c74eb3103942b50"><code>5a7a632</code></a>
    Bump Node.js runtime from node20 to node24</li>
    <li><a
    href="https://github.com/DataDog/dd-octo-sts-action/commit/260fcf964ad38660b2abc359216586af9d31a05d"><code>260fcf9</code></a>
    Add parseJwtClaims() function with tests, replace fragile inline
    parsing</li>
    <li><a
    href="https://github.com/DataDog/dd-octo-sts-action/commit/371c4d81ebd5ed74dfcc7bb2ab234d9f1e30fe65"><code>371c4d8</code></a>
    Harden CI workflows with least-privilege permissions and credential
    controls</li>
    <li><a
    href="https://github.com/DataDog/dd-octo-sts-action/commit/1fc658893bed0edd73a7e284f6266e3fc4bdc93e"><code>1fc6588</code></a>
    Include URL in fetchWithRetry error messages</li>
    <li><a
    href="https://github.com/DataDog/dd-octo-sts-action/commit/0b31f95da950c7562ef40f6447086e75515897ce"><code>0b31f95</code></a>
    Harden CI workflows with least-privilege permissions and credential
    controls</li>
    <li>Additional commits viewable in <a
    href="https://github.com/datadog/dd-octo-sts-action/compare/v1.0.3...96a25462dbcb10ebf0bfd6e2ccc917d2ab235b9a">compare
    view</a></li>
    </ul>
    </details>
    <br />

    Updates `slackapi/slack-github-action` from 2.1.1 to 3.0.1
    <details>
    <summary>Release notes</summary>
    <p><em>Sourced from <a
    href="https://github.com/slackapi/slack-github-action/releases">slackapi/slack-github-action's
    releases</a>.</em></p>
    <blockquote>
    <h2>Slack GitHub Action v3.0.1</h2>
    <h2>What's Changed</h2>
    <p>Alongside the breaking changes of <a
    href="https://github.com/slackapi/slack-github-action/releases/tag/v3.0.0"><code>@v3.0.0</code></a>
    and a <a
    href="https://docs.slack.dev/tools/slack-github-action/sending-techniques/running-slack-cli-commands/">new
    technique</a> to run Slack CLI commands, we tried the wrong name to
    publish to the GitHub Marketplace 🐙 This action is now noted as <a
    href="https://github.com/marketplace/actions/the-slack-github-action"><strong>The
    Slack GitHub Action</strong></a> in listings 🎶 ✨</p>
    <h3>:art: Maintenance</h3>
    <ul>
    <li>chore: use a unique title for marketplace in <a
    href="https://github.com/slackapi/slack-github-action/pull/576">slackapi/slack-github-action#576</a>
    - Thanks <a
    href="https://github.com/zimeg"><code>@​zimeg</code></a>!</li>
    <li>chore(release): tag version 3.0.1 in <a
    href="https://github.com/slackapi/slack-github-action/pull/577">slackapi/slack-github-action#577</a>
    - Thanks <a
    href="https://github.com/zimeg"><code>@​zimeg</code></a>!</li>
    </ul>
    <p><strong>Full Changelog</strong>: <a
    href="https://github.com/slackapi/slack-github-action/compare/v3.0.0...v3.0.1">https://github.com/slackapi/slack-github-action/compare/v3.0.0...v3.0.1</a></p>
    <h2>Slack GitHub Action v3.0.0</h2>
    <blockquote>
    <p>The <code>@v3.0.0</code> release had a hiccup on publish and we
    recommend using <a
    href="https://github.com/slackapi/slack-github-action/releases/tag/v3.0.1"><strong><code>@​v3.0.1</code></strong></a>
    or a more recent version when updating! Oops!</p>
    </blockquote>
    <p>🎽 <strong>Running Slack CLI commands and the active Node runtime,
    both included in this release</strong> 👟 ✨</p>
    <h3>⚠️ Breaking change: Node.js 24 the runtime</h3>
    <p>This major version updates the GitHub Actions required runtime to <a
    href="https://nodejs.org/en/about/previous-releases"><strong>Node.js
    24</strong>.</a> Most <a
    href="https://github.com/actions/runner-images?tab=readme-ov-file#software-and-image-support">GitHub-hosted
    runners</a> already include this, but self-hosted runners may need to be
    updated ahead of <a
    href="https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/">planned
    deprecations of Node 20 on GitHub Actions runners</a>.</p>
    <h3>📺 Enhancement: Run Slack CLI commands</h3>
    <p>This release introduces a new technique for running <a
    href="https://docs.slack.dev/tools/slack-cli">Slack CLI</a> commands
    directly in GitHub Actions workflows. Use this to install the latest
    version (or a specific one) of the CLI and execute commands like
    <code>deploy</code> for merges to main, <code>manifest validate</code>
    with tests, and other <a
    href="https://docs.slack.dev/tools/slack-cli/reference/commands/slack">commands</a>.</p>
    <p>Gather a token using the following CLI command to store with repo
    secrets, then get started with an example below:</p>
    <pre><code>$ slack auth token
    </code></pre>
    <h3>🧪 Validate an app manifest on pull requests</h3>
    <p>Check that your app manifest is valid before merging changes:</p>
    <p>🔗 <a
    href="https://docs.slack.dev/tools/slack-github-action/sending-techniques/running-slack-cli-commands/validate-a-manifest">https://docs.slack.dev/tools/slack-github-action/sending-techniques/running-slack-cli-commands/validate-a-manifest</a></p>
    <pre lang="yaml"><code>- name: Validate the manifest
      uses: slackapi/slack-github-action/cli@v3.0.0
      with:
    command: &quot;manifest validate --app ${{ vars.SLACK_APP_ID }}&quot;
        token: ${{ secrets.SLACK_SERVICE_TOKEN }}
    </code></pre>
    <h3>🚀 Deploy your app on push to main</h3>
    <p>Automate deployments whenever changes land on your main branch:</p>
    <p>🔗 <a
    href="https://docs.slack.dev/tools/slack-github-action/sending-techniques/running-slack-cli-commands/deploy-an-app">https://docs.slack.dev/tools/slack-github-action/sending-techniques/running-slack-cli-commands/deploy-an-app</a></p>
    <!-- raw HTML omitted -->
    </blockquote>
    <p>... (truncated)</p>
    </details>
    <details>
    <summary>Commits</summary>
    <ul>
    <li><a
    href="https://github.com/slackapi/slack-github-action/commit/af78098f536edbc4de71162a307590698245be95"><code>af78098</code></a>
    Release</li>
    <li><a
    href="https://github.com/slackapi/slack-github-action/commit/add1a00063f351e4c0e55c3703da81637f03a8be"><code>add1a00</code></a>
    chore(release): tag version 3.0.1 (<a
    href="https://github.com/slackapi/slack-github-action/issues/577">#577</a>)</li>
    <li><a
    href="https://github.com/slackapi/slack-github-action/commit/2bc9e7a4cd10f4d06ef49b8fa8a11efdc7fb891b"><code>2bc9e7a</code></a>
    chore: use a unique title for marketplace (<a
    href="https://github.com/slackapi/slack-github-action/issues/576">#576</a>)</li>
    <li><a
    href="https://github.com/slackapi/slack-github-action/commit/c5d43dad17bba7ebd47486137b9ab6936fd6bbf4"><code>c5d43da</code></a>
    chore(release): tag version 3.0.0 (<a
    href="https://github.com/slackapi/slack-github-action/issues/575">#575</a>)</li>
    <li><a
    href="https://github.com/slackapi/slack-github-action/commit/963b9796dcc3184602a0aefe2f052d034027bfaf"><code>963b979</code></a>
    build(deps): bump <code>@​slack/web-api</code> from 7.14.1 to 7.15.0 (<a
    href="https://github.com/slackapi/slack-github-action/issues/574">#574</a>)</li>
    <li><a
    href="https://github.com/slackapi/slack-github-action/commit/90b7328a4cea35bd9dc6fc64d7f70e772d6d5876"><code>90b7328</code></a>
    build(deps): bump <code>@​slack/logger</code> from 4.0.0 to 4.0.1 (<a
    href="https://github.com/slackapi/slack-github-action/issues/573">#573</a>)</li>
    <li><a
    href="https://github.com/slackapi/slack-github-action/commit/e45cb891a61f925570820f137980df2028625fec"><code>e45cb89</code></a>
    feat: support slack cli commands with composite action inputs (<a
    href="https://github.com/slackapi/slack-github-action/issues/560">#560</a>)</li>
    <li><a
    href="https://github.com/slackapi/slack-github-action/commit/0aed2c2a70fe17c67bfd489b5dc3d9b410f69f79"><code>0aed2c2</code></a>
    build(deps): bump https-proxy-agent from 7.0.6 to 8.0.0 (<a
    href="https://github.com/slackapi/slack-github-action/issues/572">#572</a>)</li>
    <li><a
    href="https://github.com/slackapi/slack-github-action/commit/4795f96c2818074349810cac0abc3bf5437bdc2c"><code>4795f96</code></a>
    build(deps-dev): bump sinon from 21.0.1 to 21.0.2 (<a
    href="https://github.com/slackapi/slack-github-action/issues/571">#571</a>)</li>
    <li><a
    href="https://github.com/slackapi/slack-github-action/commit/bd9e2ce619554772120b8cfcbbc7fe4bd2d42a2f"><code>bd9e2ce</code></a>
    build(deps): bump actions/setup-node from 6.2.0 to 6.3.0 (<a
    href="https://github.com/slackapi/slack-github-action/issues/569">#569</a>)</li>
    <li>Additional commits viewable in <a
    href="https://github.com/slackapi/slack-github-action/compare/91efab103c0de0a537f72a35f6b8cda0ee76bf0a...af78098f536edbc4de71162a307590698245be95">compare
    view</a></li>
    </ul>
    </details>
    <br />

    Updates `github/codeql-action` from 4.34.1 to 4.35.1
    <details>
    <summary>Release notes</summary>
    <p><em>Sourced from <a
    href="https://github.com/github/codeql-action/releases">github/codeql-action's
    releases</a>.</em></p>
    <blockquote>
    <h2>v4.35.1</h2>
    <ul>
    <li>Fix incorrect minimum required Git version for <a
    href="https://github.com/github/roadmap/issues/1158">improved
    incremental analysis</a>: it should have been 2.36.0, not 2.11.0. <a
    href="https://github.com/github/codeql-action/pull/3781">#3781</a></li>
    </ul>
    <h2>v4.35.0</h2>
    <ul>
    <li>Reduced the minimum Git version required for <a
    href="https://github.com/github/roadmap/issues/1158">improved
    incremental analysis</a> from 2.38.0 to 2.11.0. <a
    href="https://github.com/github/codeql-action/pull/3767">#3767</a></li>
    <li>Update default CodeQL bundle version to <a
    href="https://github.com/github/codeql-action/releases/tag/codeql-bundle-v2.25.1">2.25.1</a>.
    <a
    href="https://github.com/github/codeql-action/pull/3773">#3773</a></li>
    </ul>
    </blockquote>
    </details>
    <details>
    <summary>Changelog</summary>
    <p><em>Sourced from <a
    href="https://github.com/github/codeql-action/blob/main/CHANGELOG.md">github/codeql-action's
    changelog</a>.</em></p>
    <blockquote>
    <h1>CodeQL Action Changelog</h1>
    <p>See the <a
    href="https://github.com/github/codeql-action/releases">releases
    page</a> for the relevant changes to the CodeQL CLI and language
    packs.</p>
    <h2>[UNRELEASED]</h2>
    <ul>
    <li>The Git version 2.36.0 requirement for improved incremental analysis
    now only applies to repositories that contain submodules. <a
    href="https://github.com/github/codeql-action/pull/3789">#3789</a></li>
    <li>Python analysis on GHES no longer extracts the standard library,
    relying instead on models of the standard library. This should result in
    significantly faster extraction and analysis times, while the effect on
    alerts should be minimal. <a
    href="https://github.com/github/codeql-action/pull/3794">#3794</a></li>
    </ul>
    <h2>4.35.1 - 27 Mar 2026</h2>
    <ul>
    <li>Fix incorrect minimum required Git version for <a
    href="https://github.com/github/roadmap/issues/1158">improved
    incremental analysis</a>: it should have been 2.36.0, not 2.11.0. <a
    href="https://github.com/github/codeql-action/pull/3781">#3781</a></li>
    </ul>
    <h2>4.35.0 - 27 Mar 2026</h2>
    <ul>
    <li>Reduced the minimum Git version required for <a
    href="https://github.com/github/roadmap/issues/1158">improved
    incremental analysis</a> from 2.38.0 to 2.11.0. <a
    href="https://github.com/github/codeql-action/pull/3767">#3767</a></li>
    <li>Update default CodeQL bundle version to <a
    href="https://github.com/github/codeql-action/releases/tag/codeql-bundle-v2.25.1">2.25.1</a>.
    <a
    href="https://github.com/github/codeql-action/pull/3773">#3773</a></li>
    </ul>
    <h2>4.34.1 - 20 Mar 2026</h2>
    <ul>
    <li>Downgrade default CodeQL bundle version to <a
    href="https://github.com/github/codeql-action/releases/tag/codeql-bundle-v2.24.3">2.24.3</a>
    due to issues with a small percentage of Actions and JavaScript
    analyses. <a
    href="https://github.com/github/codeql-action/pull/3762">#3762</a></li>
    </ul>
    <h2>4.34.0 - 20 Mar 2026</h2>
    <ul>
    <li>Added an experimental change which disables TRAP caching when <a
    href="https://github.com/github/roadmap/issues/1158">improved
    incremental analysis</a> is enabled, since improved incremental analysis
    supersedes TRAP caching. This will improve performance and reduce
    Actions cache usage. We expect to roll this change out to everyone in
    March. <a
    href="https://github.com/github/codeql-action/pull/3569">#3569</a></li>
    <li>We are rolling out improved incremental analysis to C/C++ analyses
    that use build mode <code>none</code>. We expect this rollout to be
    complete by the end of April 2026. <a
    href="https://github.com/github/codeql-action/pull/3584">#3584</a></li>
    <li>Update default CodeQL bundle version to <a
    href="https://github.com/github/codeql-action/releases/tag/codeql-bundle-v2.25.0">2.25.0</a>.
    <a
    href="https://github.com/github/codeql-action/pull/3585">#3585</a></li>
    </ul>
    <h2>4.33.0 - 16 Mar 2026</h2>
    <ul>
    <li>
    <p>Upcoming change: Starting April 2026, the CodeQL Action will skip
    collecting file coverage information on pull requests to improve
    analysis performance. File coverage information will still be computed
    on non-PR analyses. Pull request analyses will log a warning about this
    upcoming change. <a
    href="https://github.com/github/codeql-action/pull/3562">#3562</a></p>
    <p>To opt out of this change:</p>
    <ul>
    <li><strong>Repositories owned by an organization:</strong> Create a
    custom repository property with the name
    <code>github-codeql-file-coverage-on-prs</code> and the type
    &quot;True/false&quot;, then set this property to <code>true</code> in
    the repository's settings. For more information, see <a
    href="https://docs.github.com/en/organizations/managing-organization-settings/managing-custom-properties-for-repositories-in-your-organization">Managing
    custom properties for repositories in your organization</a>.
    Alternatively, if you are using an advanced setup workflow, you can set
    the <code>CODEQL_ACTION_FILE_COVERAGE_ON_PRS</code> environment variable
    to <code>true</code> in your workflow.</li>
    <li><strong>User-owned repositories using default setup:</strong> Switch
    to an advanced setup workflow and set the
    <code>CODEQL_ACTION_FILE_COVERAGE_ON_PRS</code> environment variable to
    <code>true</code> in your workflow.</li>
    <li><strong>User-owned repositories using advanced setup:</strong> Set
    the <code>CODEQL_ACTION_FILE_COVERAGE_ON_PRS</code> environment variable
    to <code>true</code> in your workflow.</li>
    </ul>
    </li>
    <li>
    <p>Fixed <a
    href="https://github.com/github/codeql-action/issues/3555">a
    bug</a> which caused the CodeQL Action to fail loading repository
    properties if a &quot;Multi select&quot; repository property was
    configured for the repository. <a
    href="https://github.com/github/codeql-action/pull/3557">#3557</a></p>
    </li>
    <li>
    <p>The CodeQL Action now loads <a
    href="https://docs.github.com/en/organizations/managing-organization-settings/managing-custom-properties-for-repositories-in-your-organization">custom
    repository properties</a> on GitHub Enterprise Server, enabling the
    customization of features such as
    <code>github-codeql-disable-overlay</code> that was previously only
    available on GitHub.com. <a
    href="https://github.com/github/codeql-action/pull/3559">#3559</a></p>
    </li>
    <li>
    <p>Once <a
    href="https://docs.github.com/en/code-security/how-tos/secure-at-scale/configure-organization-security/manage-usage-and-access/giving-org-access-private-registries">private
    package registries</a> can be configured with OIDC-based authentication
    for organizations, the CodeQL Action will now be able to accept such
    configurations. <a
    href="https://github.com/github/codeql-action/pull/3563">#3563</a></p>
    </li>
    <li>
    <p>Fixed the retry mechanism for database uploads. Previously this would
    fail with the error &quot;Response body object should not be disturbed
    or locked&quot;. <a
    href="https://github.com/github/codeql-action/pull/3564">#3564</a></p>
    </li>
    <li>
    <p>A warning is now emitted if the CodeQL Action detects a repository
    property whose name suggests that it relates to the CodeQL Action, but
    which is not one of the properties recognised by the current version of
    the CodeQL Action. <a
    href="https://github.com/github/codeql-action/pull/3570">#3570</a></p>
    </li>
    </ul>
    <h2>4.32.6 - 05 Mar 2026</h2>
    <ul>
    <li>Update default CodeQL bundle version to <a
    href="https://github.com/github/codeql-action/releases/tag/codeql-bundle-v2.24.3">2.24.3</a>.
    <a
    href="https://github.com/github/codeql-action/pull/3548">#3548</a></li>
    </ul>
    <h2>4.32.5 - 02 Mar 2026</h2>
    <ul>
    <li>Repositories owned by an organization can now set up the
    <code>github-codeql-disable-overlay</code> custom repository property to
    disable <a
    href="https://github.com/github/roadmap/issues/1158">improved
    incremental analysis for CodeQL</a>. First, create a custom repository
    property with the name <code>github-codeql-disable-overlay</code> and
    the type &quot;True/false&quot; in the organization's settings. Then in
    the repository's settings, set this property to <code>true</code> to
    disable improved incremental analysis. For more information, see <a
    href="https://docs.github.com/en/organizations/managing-organization-settings/managing-custom-properties-for-repositories-in-your-organization">Managing
    custom properties for repositories in your organization</a>. This
    feature is not yet available on GitHub Enterprise Server. <a
    href="https://github.com/github/codeql-action/pull/3507">#3507</a></li>
    <li>Added an experimental change so that when <a
    href="https://github.com/github/roadmap/issues/1158">improved
    incremental analysis</a> fails on a runner — potentially due to
    insufficient disk space — the failure is recorded in the Actions cache
    so that subsequent runs will automatically skip improved incremental
    analysis until something changes (e.g. a larger runner is provisioned or
    a new CodeQL version is released). We expect to roll this change out to
    everyone in March. <a
    href="https://github.com/github/codeql-action/pull/3487">#3487</a></li>
    </ul>
    <!-- raw HTML omitted -->
    </blockquote>
    <p>... (truncated)</p>
    </details>
    <details>
    <summary>Commits</summary>
    <ul>
    <li><a
    href="https://github.com/github/codeql-action/commit/c10b8064de6f491fea524254123dbe5e09572f13"><code>c10b806</code></a>
    Merge pull request <a
    href="https://github.com/github/codeql-action/issues/3782">#3782</a>
    from github/update-v4.35.1-d6d1743b8</li>
    <li><a
    href="https://github.com/github/codeql-action/commit/c5ffd0683786820677d054e3505e1c5bb4b8c227"><code>c5ffd06</code></a>
    Update changelog for v4.35.1</li>
    <li><a
    href="https://github.com/github/codeql-action/commit/d6d1743b8ec7ecd94f78ad1ce4cb3d8d2ba58001"><code>d6d1743</code></a>
    Merge pull request <a
    href="https://github.com/github/codeql-action/issues/3781">#3781</a>
    from github/henrymercer/update-git-minimum-version</li>
    <li><a
    href="https://github.com/github/codeql-action/commit/65d2efa7333ad65f97cc54be40f4cd18630f884c"><code>65d2efa</code></a>
    Add changelog note</li>
    <li><a
    href="https://github.com/github/codeql-action/commit/2437b20ab31021229573a66717323dd5c6ce9319"><code>2437b20</code></a>
    Update minimum git version for overlay to 2.36.0</li>
    <li><a
    href="https://github.com/github/codeql-action/commit/ea5f71947c021286c99f61cc426a10d715fe4434"><code>ea5f719</code></a>
    Merge pull request <a
    href="https://github.com/github/codeql-action/issues/3775">#3775</a>
    from github/dependabot/npm_and_yarn/node-forge-1.4.0</li>
    <li><a
    href="https://github.com/github/codeql-action/commit/45ceeea896ba2293e10982f871198d1950ee13d6"><code>45ceeea</code></a>
    Merge pull request <a
    href="https://github.com/github/codeql-action/issues/3777">#3777</a>
    from github/mergeback/v4.35.0-to-main-b8bb9f28</li>
    <li><a
    href="https://github.com/github/codeql-action/commit/24448c98434f429f901d27db7ddae55eec5cc1c4"><code>24448c9</code></a>
    Rebuild</li>
    <li><a
    href="https://github.com/github/codeql-action/commit/7c510606312e5c68ac8b27c009e5254f226f5dfa"><code>7c51060</code></a>
    Update changelog and version after v4.35.0</li>
    <li><a
    href="https://github.com/github/codeql-action/commit/b8bb9f28b8d3f992092362369c57161b755dea45"><code>b8bb9f2</code></a>
    Merge pull request <a
    href="https://github.com/github/codeql-action/issues/3776">#3776</a>
    from github/update-v4.35.0-0078ad667</li>
    <li>Additional commits viewable in <a
    href="https://github.com/github/codeql-action/compare/38697555549f1db7851b81482ff19f1fa5c4fedc...c10b8064de6f491fea524254123dbe5e09572f13">compare
    view</a></li>
    </ul>
    </details>
    <br />

    Updates `actions/setup-go` from 6.3.0 to 6.4.0
    <details>
    <summary>Release notes</summary>
    <p><em>Sourced from <a
    href="https://github.com/actions/setup-go/releases">actions/setup-go's
    releases</a>.</em></p>
    <blockquote>
    <h2>v6.4.0</h2>
    <h2>What's Changed</h2>
    <h3>Enhancement</h3>
    <ul>
    <li>Add go-download-base-url input for custom Go distributions by <a
    href="https://github.com/gdams"><code>@​gdams</code></a> in <a
    href="https://github.com/actions/setup-go/pull/721">actions/setup-go#721</a></li>
    </ul>
    <h3>Dependency update</h3>
    <ul>
    <li>Upgrade minimatch from 3.1.2 to 3.1.5 by <a
    href="https://github.com/dependabot"><code>@​dependabot</code></a> in <a
    href="https://github.com/actions/setup-go/pull/727">actions/setup-go#727</a></li>
    </ul>
    <h3>Documentation update</h3>
    <ul>
    <li>Rearrange README.md, add advanced-usage.md by <a
    href="https://github.com/priyagupta108"><code>@​priyagupta108</code></a>
    in <a
    href="https://github.com/actions/setup-go/pull/724">actions/setup-go#724</a></li>
    <li>Fix Microsoft build of Go link by <a
    href="https://github.com/gdams"><code>@​gdams</code></a> in <a
    href="https://github.com/actions/setup-go/pull/734">actions/setup-go#734</a></li>
    </ul>
    <h2>New Contributors</h2>
    <ul>
    <li><a href="https://github.com/gdams"><code>@​gdams</code></a> made
    their first contribution in <a
    href="https://github.com/actions/setup-go/pull/721">actions/setup-go#721</a></li>
    </ul>
    <p><strong>Full Changelog</strong>: <a
    href="https://github.com/actions/setup-go/compare/v6...v6.4.0">https://github.com/actions/setup-go/compare/v6...v6.4.0</a></p>
    </blockquote>
    </details>
    <details>
    <summary>Commits</summary>
    <ul>
    <li><a
    href="https://github.com/actions/setup-go/commit/4a3601121dd01d1626a1e23e37211e3254c1c06c"><code>4a36011</code></a>
    docs: fix Microsoft build of Go link (<a
    href="https://github.com/actions/setup-go/issues/734">#734</a>)</li>
    <li><a
    href="https://github.com/actions/setup-go/commit/8f19afcc704763637be6b1718da0af52ca05785d"><code>8f19afc</code></a>
    feat: add go-download-base-url input for custom Go distributions (<a
    href="https://github.com/actions/setup-go/issues/721">#721</a>)</li>
    <li><a
    href="https://github.com/actions/setup-go/commit/27fdb267c15a8835f1ead03dfa07f89be2bb741a"><code>27fdb26</code></a>
    Bump minimatch from 3.1.2 to 3.1.5 (<a
    href="https://github.com/actions/setup-go/issues/727">#727</a>)</li>
    <li><a
    href="https://github.com/actions/setup-go/commit/def8c394e3ad351a79bc93815e4a585520fe993b"><code>def8c39</code></a>
    Rearrange README.md, add advanced-usage.md (<a
    href="https://github.com/actions/setup-go/issues/724">#724</a>)</li>
    <li>See full diff in <a
    href="https://github.com/actions/setup-go/compare/4b73464bb391d4059bd26b0524d20df3927bd417...4a3601121dd01d1626a1e23e37211e3254c1c06c">compare
    view</a></li>
    </ul>
    </details>
    <br />

    Dependabot will resolve any conflicts with this PR as long as you don't
    alter it yourself. You can also trigger a rebase manually by commenting
    `@dependabot rebase`.

    [//]: # (dependabot-automerge-start)
    [//]: # (dependabot-automerge-end)

    ---

    <details>
    <summary>Dependabot commands and options</summary>
    <br />

    You can trigger Dependabot actions by commenting on this PR:
    - `@dependabot rebase` will rebase this PR
    - `@dependabot recreate` will recreate this PR, overwriting any edits
    that have been made to it
    - `@dependabot show <dependency name> ignore conditions` will show all
    of the ignore conditions of the specified dependency
    - `@dependabot ignore <dependency name> major version` will close this
    group update PR and stop Dependabot creating any more for the specific
    dependency's major version (unless you unignore this specific
    dependency's major version or upgrade to it yourself)
    - `@dependabot ignore <dependency name> minor version` will close this
    group update PR and stop Dependabot creating any more for the specific
    dependency's minor version (unless you unignore this specific
    dependency's minor version or upgrade to it yourself)
    - `@dependabot ignore <dependency name>` will close this group update PR
    and stop Dependabot creating any more for the specific dependency
    (unless you unignore this specific dependency or upgrade to it yourself)
    - `@dependabot unignore <dependency name>` will remove all of the ignore
    conditions of the specified dependency
    - `@dependabot unignore <dependency name> <ignore condition>` will
    remove the ignore condition of the specified dependency and ignore
    conditions

    </details>

    Signed-off-by: dependabot[bot] <support@github.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

commit b40c001f54fe95c5307316b80a10a46cdcbeebbd
Author: Andrew Lock <andrew.lock@datadoghq.com>
Date:   Wed Apr 1 16:13:39 2026 +0100

    Add hardcoded limits for OCI and libinjection packages (#8382)

    ## Summary of changes

    Adds .NET-specific OCI and libinjection package size limits, instead of
    relying on the "global" limits

    ## Reason for change

    https://github.com/DataDog/dd-trace-dotnet/pull/8351 bumped the global
    package size limitations for OCI and lib-injection images, but @lloeki
    flagged that this can lead to large regressions in size to slip through.
    Given that these packages are quite size-sensitive, this is sub-optimal.

    ## Implementation details

    This PR uses the work in
    https://github.com/DataDog/libdatadog-build/pull/171 and
    https://github.com/DataDog/libdatadog-build/pull/174 to set size-limits
    based on [his
    example](https://github.com/DataDog/dd-trace-rb/blob/af17de097795fc3b0053f47d1436f308e0d5f92e/.gitlab-ci.yml#L17-L18).
    It adds the package size override variables, limiting both to 40MB.

    ## Test coverage

    Right now we have the following sizes:

    lib-injection images:
    - `linux-amd64`: 38MB
    - `linux-arm64`: 35MB

    OCI images:
    - `linux-amd64`: 30MB
    - `linux-arm64`: 28MB
    - `win-amd64`: 35MB

    So a 40MB limit across the board seems reasonable to me.

    You can see these limits being applied in [the Gitlab
    run](https://gitlab.ddbuild.io/DataDog/apm-reliability/dd-trace-dotnet/-/jobs/1545330315)

commit e72f8e8d2dc624d3ee711a78a76f113727adc0f7
Author: Andrew Lock <andrew.lock@datadoghq.com>
Date:   Wed Apr 1 16:10:45 2026 +0100

    Delete the static analysis workflow (#8393)

    ## Summary of changes

    Delete the static analysis workflow

    ## Reason for change

    Nobody uses it and it's a pain to migrate

commit 954cad2f4c12a203a503401bc21774ac2ed2cc0f
Author: Steven Bouwkamp <steven.bouwkamp@datadoghq.com>
Date:   Wed Apr 1 10:47:35 2026 -0400

    Pin floating pre-release versions of SQLitePCLRaw.* dependencies in samples (#8390)

    ## Summary of changes

    Pins two different projects that were using floating versions of
    PackageReferences to `SQLitePCLRaw.bundle_e_sqlite3` and
    `SQLitePCLRaw.core`.

    These appeared to link to these versions, I bumped them to be stable

    -
    https://www.nuget.org/packages/SQLitePCLRaw.core/2.1.6-pre20230809203314
    -
    https://www.nuget.org/packages/SQLitePCLRaw.bundle_e_sqlite3/2.1.6-pre20230809203314

    ## Reason for change

    We don't want any floating dependencies

    ## Implementation details

    Searched here:
    https://github.com/search?q=repo%3ADataDog%2Fdd-trace-dotnet%20%2FVersion%3D%22%5B%5E%22%5D*%5C*%2F&type=code

    ## Test coverage

    This is the test, hopefully this works

    ## Other details
    <!-- Fixes #{issue} -->

    <!--  ⚠️ Note:

    Where possible, please obtain 2 approvals prior to merging. Unless
    CODEOWNERS specifies otherwise, for external teams it is typically best
    to have one review from a team member, and one review from apm-dotnet.
    Trivial changes do not require 2 reviews.

    MergeQueue is NOT enabled in this repository. If you have write access
    to the repo, the PR has 1-2 approvals (see above), and all of the
    required checks have passed, you can use the Squash and Merge button to
    merge the PR. If you don't have write access, or you need help, reach
    out in the #apm-dotnet channel in Slack.
    -->

commit 5f7ed4de8dc1152a8326d40b0ad95fb6593e6e67
Author: Steven Bouwkamp <steven.bouwkamp@datadoghq.com>
Date:   Wed Apr 1 09:48:16 2026 -0400

    Configure `GeneratePackageVersions` to support a "cooldown" on dependencies (#8371)

    ## Summary of changes

    > default cooldown period is 2 days

    Adds a configurable cooldown period to the `GeneratePackageVersions` to
    support remediation efforts for follow up after #incident-51602.

    To use supply the optional parameter `--PackageVersionCooldownDays X`
    where `X` is some number of days. The current period is at the moment is
    going to be 2 days and is the default now when the overall
    `GeneratePackageVersion` target is ran. Additionally, this is overridden
    to 0 if `--IncludePackages` is supplied (this is commonly used when
    working on a singular package locally).

    After running the tool a "cooldown" report is generated, this file will
    contain packages that we see have a newer version, but will not
    incorporate into the test, the fallback version that falls within the
    cooldown period is provided. This file content will show up in the
    output of future test package version bump PRs.

    Note that this is for _automated_ updates, so if it sees something
    already updated it will honor it.

    Here's an example output ran locally with 14 days set:

    ```
    ## Package Version Cooldown Report

    The following versions were published less than **14 days** ago and have been overridden.
    These require manual review before inclusion.

    | Package | Integration | Overridden Version | Published | Age (days) | Using Instead |
    |---------|-------------|--------------------|-----------|------------|---------------|
    | AWSSDK.Core | AwsSdk | 4.0.3.22 | 2026-03-25 | 0 | 4.0.3.21 |
    | AWSSDK.S3 | AwsS3 | 4.0.19.2 | 2026-03-25 | 0 | 4.0.19.1 |
    | StackExchange.Redis | StackExchangeRedis | 2.12.8 | 2026-03-25 | 0 | 2.12.4 |
    ```

    ## Reason for change

    In https://github.com/DataDog/dd-trace-dotnet/pull/8364 and
    #incident-51602 all automated dependency updaters to be disabled
    temporarily, to re-enable we need to supply a 2 day "cooldown" to any
    version that we update to (in other words the version of the NuGet must
    be published for at least 2 days before we can update to it).

    ## Implementation details

    I made Claude do this 🤖

    - NuGetPackageHelper now captures the Published date from
    IPackageSearchMetadata via a new VersionWithDate record (previously
    discarded)
      - NuGetVersionCache stores the new {Version, Published} format
    - PackageVersionGenerator.ApplyCooldown filters selected versions after
    LatestMajors/LatestMinors/LatestSpecific selection:
        - Versions outside the cooldown window pass through unchanged
    - Versions at or below the baseline (derived from
    supported_versions.json MaxVersionTestedInclusive) are kept even if
      within cooldown -- no downgrades
    - Versions above the baseline and within cooldown are overridden to the
    best available fallback
    - CooldownReport collects overridden versions and renders a markdown
    table saved to tracer/build/cooldown_report.md
    - The GitHub Actions workflow reads the report and appends it to the
    auto-bump PR body
    - Honeypot IntegrationGroups.cs fixes: MSTest.TestFramework now maps to
    itself, Hangfire.Core maps to Hangfire.Core (was Hangfire), OpenFeature
    mapping moved to Datadog.FeatureFlags.OpenFeature

    Passing `--IncludePackages` will override the cooldown to 0

    ## Test coverage

    I ran `GeneratePackageVersions --PackageVersionCooldownDays 14` locally
    seems good enough IMO (also ran without, with different days etc)

    ```
    [WRN] GeneratePackageVersi: 3 package version(s) were excluded due to the 14-day cooldown period
    [WRN] GeneratePackageVersi:   AWSSDK.Core 4.0.3.22 overridden (published 2026-03-25, using: 4.0.3.21)
    [WRN] GeneratePackageVersi:   AWSSDK.S3 4.0.19.2 overridden (published 2026-03-25, using: 4.0.19.1)
    [WRN] GeneratePackageVersi:   StackExchange.Redis 2.12.8 overridden (published 2026-03-25, using: 2.12.4)
    ```

    ## Other details
    <!-- Fixes #{issue} -->

    The workflow file (`auto_bump_test_package_versions.yml`) will be
    re-enabled with this PR

    <!--  ⚠️ Note:

    Where possible, please obtain 2 approvals prior to merging. Unless
    CODEOWNERS specifies otherwise, for external teams it is typically best
    to have one review from a team member, and one review from apm-dotnet.
    Trivial changes do not require 2 reviews.

    MergeQueue is NOT enabled in this repository. If you have write access
    to the repo, the PR has 1-2 approvals (see above), and all of the
    required checks have passed, you can use the Squash and Merge button to
    merge the PR. If you don't have write access, or you need help, reach
    out in the #apm-dotnet channel in Slack.
    -->

commit 07039f099ad278d0d6b397ffd7d92cea62d07cd8
Author: Andrew Lock <andrew.lock@datadoghq.com>
Date:   Wed Apr 1 09:47:34 2026 +0100

    Set `DD_TRACE_OTEL_ENABLED=true` by default for all integration…
bouwkast added a commit that referenced this pull request Apr 22, 2026
## Summary of changes

This goes back through the recent changes (#8371 and #8340) to
`GeneratePackageVersions` and attempts to do some removals,
refactorings, and fixes that have come up. Notably this removes the
`nuget_cache`, fixes `IncludePackages` (again 😅), and rewrites the
cooldown logic to not use `supported_versions.json` and `nuget_cache`
and instead reads from the `.g.cs` files in addition to refactoring the
verbage used throughout.

## Reason for change

While working on (#8128) I started running into several issues with
`GeneratePackageVersions` namely that I couldn't get `IncludePackages`
to work and then I started fighting issues with the `nuget_cache` as
well when attempting to add a new integration.

This sets out to do a few things:

- Simplify the logic for NuGet cooldown (automated dependency updates
must adhere to our current cooldown policy for potential supply chain
attacks)
- Remove the `nuget_cache` - this was added so that we wouldn't go and
query NuGet info for packages not listed in the `IncludePackages`
- Change the "verbage" of the cooldown/baseline to be easier to read /
follow
- Do NOT read / rely upon `supported_versions` (this is what I
previously used to determine what the highest version was currently
allowed) - this file is planned to be changed/modified/removed by
another team in the near future hence why we shouldn't use it.
- I didn't account for different timezones in the publish state of the
`nuget_cache` before so if someone ran it depending on their locale it
would change.

## Implementation details

- New `CooldownMode` `enum`: `Normal`, `BypassCooldown`, `Freeze`
  - Normal drops recent versions that are above the previous max
- BypassCooldown accepts all in-range versions (no cooldown) (when
`IncludePackages` is used is an example)
  - Freeze re-emits the previous run's output verbatim
- `XUnitFileGenerator.LoadExistingVersions` reads the previous `.g.cs`
and returns `Dictionary<IntegrationName, List<(Framework, Versions)>>`.
`PackageGroup` loads this once and exposes `TryGetFrozenVersions`
- I think we should probably still try and do something different here
but this seems a bit more reasonable
- Deleted `nuget_version_cache.json` and `NuGetVersionCache.cs`
  - No longer used/needed
- Some readability improvements
  -  `IsWithinCooldown` → `WasPublishedTooRecently`
  - `baseline` → `previousMaxVersions`
- `ApplyCooldown` now uses two named local booleans
(`publishedTooRecently`, `atOrBelowPreviousMax`) so the drop condition
reads positively: "drop the version if it was published too recently
**and** we haven't already shipped against it."

## Test coverage

I ran it locally for a handful of cases I think it is better.

## Other details
<!-- Fixes #{issue} -->

I have ran through several instances with this and it _seems_ to be
good, basically default runs, runs with configurable cooldowns, runs
with `IncludePackages` and runs with `ExcludePackages`. All appeared as
expected to me.


<!--  ⚠️ Note:

Where possible, please obtain 2 approvals prior to merging. Unless
CODEOWNERS specifies otherwise, for external teams it is typically best
to have one review from a team member, and one review from apm-dotnet.
Trivial changes do not require 2 reviews.

MergeQueue is NOT enabled in this repository. If you have write access
to the repo, the PR has 1-2 approvals (see above), and all of the
required checks have passed, you can use the Squash and Merge button to
merge the PR. If you don't have write access, or you need help, reach
out in the #apm-dotnet channel in Slack.
-->

---------

Co-authored-by: Andrew Lock <andrew.lock@datadoghq.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

AI Generated Largely based on code generated by an AI or LLM. This label is the same across all dd-trace-* repos

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants